default search action
BibTeX records: Thomas Johansson 0001
@inproceedings{DBLP:conf/uss/0001NS024, author = {Qian Guo and Denis Nabokov and Elias Suvanto and Thomas Johansson}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/guo-qian}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001NS024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangMEJ24, author = {Dachao Wang and Alexander Maximov and Patrik Ekdahl and Thomas Johansson}, title = {A new stand-alone {MAC} construct called {SMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {819}, year = {2024}, url = {https://eprint.iacr.org/2024/819}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangMEJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NgoDJ23, author = {Kalle Ngo and Elena Dubrova and Thomas Johansson}, title = {A side-channel attack on a masked and shuffled software implementation of Saber}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {4}, pages = {443--460}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00315-3}, doi = {10.1007/S13389-023-00315-3}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NgoDJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HuangSC0023, author = {Senyang Huang and Rui Qi Sim and Chitchanok Chuengsatiansup and Qian Guo and Thomas Johansson}, title = {Cache-Timing Attack Against {HQC}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {136--163}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.136-163}, doi = {10.46586/TCHES.V2023.I3.136-163}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HuangSC0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GuoNNJ23, author = {Qian Guo and Denis Nabokov and Alexander Nilsson and Thomas Johansson}, editor = {Jian Guo and Ron Steinfeld}, title = {{SCA-LDPC:} {A} Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14441}, pages = {203--236}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8730-6\_7}, doi = {10.1007/978-981-99-8730-6\_7}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GuoNNJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/JohanssonMN23, author = {Thomas Johansson and Willi Meier and Vu Nguyen}, title = {Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2023, Taipei, Taiwan, June 25-30, 2023}, pages = {477--482}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISIT54713.2023.10206853}, doi = {10.1109/ISIT54713.2023.10206853}, timestamp = {Mon, 28 Aug 2023 17:20:14 +0200}, biburl = {https://dblp.org/rec/conf/isit/JohanssonMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pqcrypto/2023, editor = {Thomas Johansson and Daniel Smith{-}Tone}, title = {Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14154}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-40003-2}, doi = {10.1007/978-3-031-40003-2}, isbn = {978-3-031-40002-5}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangSCGJ23, author = {Senyang Huang and Rui Qi Sim and Chitchanok Chuengsatiansup and Qian Guo and Thomas Johansson}, title = {Cache-timing attack against {HQC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2023}, url = {https://eprint.iacr.org/2023/102}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuangSCGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoJN23, author = {Qian Guo and Thomas Johansson and Vu Nguyen}, title = {A New Sieving-Style Information-Set Decoding Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2023}, url = {https://eprint.iacr.org/2023/247}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoJN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoNNJ23, author = {Qian Guo and Denis Nabokov and Alexander Nilsson and Thomas Johansson}, title = {{SCA-LDPC:} {A} Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2023}, url = {https://eprint.iacr.org/2023/294}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoNNJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GuoHJLNS22, author = {Qian Guo and Clemens Hlauschek and Thomas Johansson and Norman Lahr and Alexander Nilsson and Robin Leander Schr{\"{o}}der}, title = {Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in {HQC} and {BIKE}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {223--263}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.223-263}, doi = {10.46586/TCHES.V2022.I3.223-263}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/GuoHJLNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GuoJJ22, author = {Qian Guo and Andreas Johansson and Thomas Johansson}, title = {A Key-Recovery Side-Channel Attack on Classic McEliece Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {800--827}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.800-827}, doi = {10.46586/TCHES.V2022.I4.800-827}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GuoJJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/YangGJL22, author = {Jing Yang and Qian Guo and Thomas Johansson and Michael Lentmaier}, title = {Revisiting the Concrete Security of Goldreich's Pseudorandom Generator}, journal = {{IEEE} Trans. Inf. Theory}, volume = {68}, number = {2}, pages = {1329--1354}, year = {2022}, url = {https://doi.org/10.1109/TIT.2021.3128315}, doi = {10.1109/TIT.2021.3128315}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/YangGJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/JohanssonMN22, author = {Thomas Johansson and Willi Meier and Vu Nguyen}, title = {Attacks on the Firekite Cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {191--216}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.191-216}, doi = {10.46586/TOSC.V2022.I3.191-216}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/JohanssonMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pqcrypto/2022, editor = {Jung Hee Cheon and Thomas Johansson}, title = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13512}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17234-2}, doi = {10.1007/978-3-031-17234-2}, isbn = {978-3-031-17233-5}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JohanssonMN22, author = {Thomas Johansson and Willi Meier and Vu Nguyen}, title = {Attacks on the Firekite cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2022}, url = {https://eprint.iacr.org/2022/148}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JohanssonMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoJJ22, author = {Qian Guo and Andreas Johansson and Thomas Johansson}, title = {A Key-Recovery Side-Channel Attack on Classic McEliece}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2022}, url = {https://eprint.iacr.org/2022/514}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoJJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BudroniGJMW21, author = {Alessandro Budroni and Qian Guo and Thomas Johansson and Erik M{\aa}rtensson and Paul Stankovski Wagner}, title = {Improvements on Making {BKW} Practical for Solving {LWE}}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {31}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040031}, doi = {10.3390/CRYPTOGRAPHY5040031}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BudroniGJMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NgoDGJ21, author = {Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson}, title = {A Side-Channel Attack on a Masked {IND-CCA} Secure Saber {KEM} Implementation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {676--707}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.676-707}, doi = {10.46586/TCHES.V2021.I4.676-707}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/NgoDGJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/00250M21, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {Improved guess-and-determine and distinguishing attacks on {SNOW-V}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {54--83}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i3.54-83}, doi = {10.46586/TOSC.V2021.I3.54-83}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/00250M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GuoJ21, author = {Qian Guo and Thomas Johansson}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Faster Dual Lattice Attacks for Solving {LWE} with Applications to {CRYSTALS}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {33--62}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_2}, doi = {10.1007/978-3-030-92068-5\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GuoJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HellJMMY21, author = {Martin Hell and Thomas Johansson and Alexander Maximov and Willi Meier and Hirotaka Yoshida}, editor = {Mauro Conti and Marc Stevens and Stephan Krenn}, title = {Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction}, booktitle = {Cryptology and Network Security - 20th International Conference, {CANS} 2021, Vienna, Austria, December 13-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13099}, pages = {24--41}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92548-2\_2}, doi = {10.1007/978-3-030-92548-2\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/HellJMMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NgoD021, author = {Kalle Ngo and Elena Dubrova and Thomas Johansson}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Stefan Katzenbeisser and Debdeep Mukhopadhyay}, title = {Breaking Masked and Shuffled {CCA} Secure Saber {KEM} by Power Analysis}, booktitle = {ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, Virtual Event, Republic of Korea, 19 November 2021}, pages = {51--61}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474376.3487277}, doi = {10.1145/3474376.3487277}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NgoD021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/NilssonBK021, author = {Alexander Nilsson and Irina E. Bocharova and Boris D. Kudryashov and Thomas Johansson}, title = {A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2021, Melbourne, Australia, July 12-20, 2021}, pages = {1266--1271}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISIT45174.2021.9517902}, doi = {10.1109/ISIT45174.2021.9517902}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/NilssonBK021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/EkdahlM0Y21, author = {Patrik Ekdahl and Alexander Maximov and Thomas Johansson and Jing Yang}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {SNOW-Vi: an extreme performance variant of {SNOW-V} for lower grade CPUs}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {261--272}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467829}, doi = {10.1145/3448300.3467829}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/EkdahlM0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-02668, author = {Jing Yang and Qian Guo and Thomas Johansson and Michael Lentmaier}, title = {Revisiting the Concrete Security of Goldreich's Pseudorandom Generator}, journal = {CoRR}, volume = {abs/2103.02668}, year = {2021}, url = {https://arxiv.org/abs/2103.02668}, eprinttype = {arXiv}, eprint = {2103.02668}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-02668.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NgoDGJ21, author = {Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson}, title = {A Side-Channel Attack on a Masked {IND-CCA} Secure Saber {KEM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2021}, url = {https://eprint.iacr.org/2021/079}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NgoDGJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ekdahl0MY21, author = {Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang}, title = {SNOW-Vi: an extreme performance variant of {SNOW-V} for low-end CPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2021}, url = {https://eprint.iacr.org/2021/236}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ekdahl0MY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangJM21, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {New improved attacks on {SNOW-V}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2021}, url = {https://eprint.iacr.org/2021/544}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NilssonBKJ21, author = {Alexander Nilsson and Irina E. Bocharova and Boris D. Kudryashov and Thomas Johansson}, title = {A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2021}, url = {https://eprint.iacr.org/2021/610}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NilssonBKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HellJMMY21, author = {Martin Hell and Thomas Johansson and Alexander Maximov and Willi Meier and Hirotaka Yoshida}, title = {Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2021}, url = {https://eprint.iacr.org/2021/751}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HellJMMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NgoDJ21, author = {Kalle Ngo and Elena Dubrova and Thomas Johansson}, title = {Breaking Masked and Shuffled {CCA} Secure Saber {KEM} by Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {902}, year = {2021}, url = {https://eprint.iacr.org/2021/902}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NgoDJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/YangJ20, author = {Jing Yang and Thomas Johansson}, title = {An overview of cryptographic primitives for possible use in 5G and beyond}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {12}, year = {2020}, url = {https://doi.org/10.1007/s11432-019-2907-4}, doi = {10.1007/S11432-019-2907-4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/YangJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GuoJL20, author = {Qian Guo and Thomas Johansson and Carl L{\"{o}}ndahl}, title = {Solving {LPN} Using Covering Codes}, journal = {J. Cryptol.}, volume = {33}, number = {1}, pages = {1--33}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09338-8}, doi = {10.1007/S00145-019-09338-8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/GuoJL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/YangJM20, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {Spectral analysis of {ZUC-256}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {266--288}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.266-288}, doi = {10.13154/TOSC.V2020.I1.266-288}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/YangJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Guo020, author = {Qian Guo and Thomas Johansson}, editor = {Shiho Moriai and Huaxiong Wang}, title = {A New Decryption Failure Attack Against {HQC}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {353--382}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_12}, doi = {10.1007/978-3-030-64837-4\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Guo020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/00010N20, author = {Qian Guo and Thomas Johansson and Alexander Nilsson}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {A Key-Recovery Timing Attack on Post-quantum Primitives Using the Fujisaki-Okamoto Transformation and Its Application on FrodoKEM}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {359--386}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_13}, doi = {10.1007/978-3-030-56880-1\_13}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/00010N20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Budroni00MW20, author = {Alessandro Budroni and Qian Guo and Thomas Johansson and Erik M{\aa}rtensson and Paul Stankovski Wagner}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Making the {BKW} Algorithm Practical for {LWE}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {417--439}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_19}, doi = {10.1007/978-3-030-65277-7\_19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Budroni00MW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoJN20, author = {Qian Guo and Thomas Johansson and Alexander Nilsson}, title = {A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2020}, url = {https://eprint.iacr.org/2020/743}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoJN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudroniGJMW20, author = {Alessandro Budroni and Qian Guo and Thomas Johansson and Erik M{\aa}rtensson and Paul Stankovski Wagner}, title = {Making the {BKW} Algorithm Practical for {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1467}, year = {2020}, url = {https://eprint.iacr.org/2020/1467}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BudroniGJMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/GuoJMW19, author = {Qian Guo and Thomas Johansson and Erik M{\aa}rtensson and Paul Stankovski Wagner}, title = {Some cryptanalytic and coding-theoretic applications of a soft stern algorithm}, journal = {Adv. Math. Commun.}, volume = {13}, number = {4}, pages = {559--578}, year = {2019}, url = {https://doi.org/10.3934/amc.2019035}, doi = {10.3934/AMC.2019035}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/GuoJMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SolovevaAJMZ19, author = {Faina I. Solov'eva and Daniel Augot and Thomas Johansson and Marine Minier and Victor A. Zinoviev}, title = {Editorial: Special issue on coding and cryptography}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {183--184}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00601-w}, doi = {10.1007/S10623-018-00601-W}, timestamp = {Wed, 20 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SolovevaAJMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GuoJ19, author = {Qian Guo and Thomas Johansson}, title = {A new birthday-type algorithm for attacking the fresh re-keying countermeasure}, journal = {Inf. Process. Lett.}, volume = {146}, pages = {30--34}, year = {2019}, url = {https://doi.org/10.1016/j.ipl.2019.02.005}, doi = {10.1016/J.IPL.2019.02.005}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/GuoJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NilssonJS19, author = {Alexander Nilsson and Thomas Johansson and Paul Stankovski}, title = {Error Amplification in Code-based Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {238--258}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.238-258}, doi = {10.13154/TCHES.V2019.I1.238-258}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/NilssonJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GuoJW19, author = {Qian Guo and Thomas Johansson and Paul Stankovski Wagner}, title = {A Key Recovery Reaction Attack on {QC-MDPC}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {3}, pages = {1845--1861}, year = {2019}, url = {https://doi.org/10.1109/TIT.2018.2877458}, doi = {10.1109/TIT.2018.2877458}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GuoJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GuoJMW19, author = {Qian Guo and Thomas Johansson and Erik M{\aa}rtensson and Paul Stankovski Wagner}, title = {On the Asymptotics of Solving the {LWE} Problem Using Coded-BKW With Sieving}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {8}, pages = {5243--5259}, year = {2019}, url = {https://doi.org/10.1109/TIT.2019.2906233}, doi = {10.1109/TIT.2019.2906233}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GuoJMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Ekdahl0MY19, author = {Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang}, title = {A new {SNOW} stream cipher called {SNOW-V}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {1--42}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.1-42}, doi = {10.13154/TOSC.V2019.I3.1-42}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Ekdahl0MY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/YangJM19, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {Vectorized linear approximations for attacks on {SNOW} 3G}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {249--271}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.249-271}, doi = {10.13154/TOSC.V2019.I4.249-271}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/YangJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/00010Y19, author = {Qian Guo and Thomas Johansson and Jing Yang}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {A Novel {CCA} Attack Using Decryption Errors Against {LAC}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11921}, pages = {82--111}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34578-5\_4}, doi = {10.1007/978-3-030-34578-5\_4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/00010Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/Hell0MSY19, author = {Martin Hell and Thomas Johansson and Willi Meier and Jonathan S{\"{o}}nnerup and Hirotaka Yoshida}, editor = {Claude Carlet and Sylvain Guilley and Abderrahmane Nitaj and El Mamoun Souidi}, title = {An {AEAD} Variant of the Grain Stream Cipher}, booktitle = {Codes, Cryptology and Information Security - Third International Conference, {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji}, series = {Lecture Notes in Computer Science}, volume = {11445}, pages = {55--71}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16458-4\_5}, doi = {10.1007/978-3-030-16458-4\_5}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/c2si/Hell0MSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/BocharovaJK19, author = {Irina E. Bocharova and Thomas Johansson and Boris D. Kudryashov}, title = {Improved iterative decoding of {QC-MDPC} codes in the McEliece public key cryptosystem}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2019, Paris, France, July 7-12, 2019}, pages = {1882--1886}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISIT.2019.8849839}, doi = {10.1109/ISIT.2019.8849839}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/BocharovaJK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DAnversGJNVV19, author = {Jan{-}Pieter D'Anvers and Qian Guo and Thomas Johansson and Alexander Nilsson and Frederik Vercauteren and Ingrid Verbauwhede}, editor = {Dongdai Lin and Kazue Sako}, title = {Decryption Failure Attacks on {IND-CCA} Secure Lattice-Based Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {565--598}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_19}, doi = {10.1007/978-3-030-17259-6\_19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DAnversGJNVV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/00010MW19, author = {Qian Guo and Thomas Johansson and Erik M{\aa}rtensson and Paul Stankovski Wagner}, title = {On the Asymptotics of Solving the {LWE} Problem Using Coded-BKW with Sieving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2019}, url = {https://eprint.iacr.org/2019/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/00010MW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/00010N19, author = {Qian Guo and Thomas Johansson and Alexander Nilsson}, title = {A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2019}, url = {https://eprint.iacr.org/2019/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/00010N19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangJM19, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {Vectorized linear approximations for attacks on {SNOW} 3G}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {991}, year = {2019}, url = {https://eprint.iacr.org/2019/991}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoJY19, author = {Qian Guo and Thomas Johansson and Jing Yang}, title = {A Novel {CCA} Attack using Decryption Errors against {LAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1308}, year = {2019}, url = {https://eprint.iacr.org/2019/1308}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoJY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yang0M19, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {Spectral analysis of {ZUC-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1352}, year = {2019}, url = {https://eprint.iacr.org/2019/1352}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yang0M19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/DeneuvilleGGJ18, author = {Jean{-}Christophe Deneuville and Philippe Gaborit and Qian Guo and Thomas Johansson}, title = {Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol}, booktitle = {2018 {IEEE} International Symposium on Information Theory, {ISIT} 2018, Vail, CO, USA, June 17-22, 2018}, pages = {1450--1454}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISIT.2018.8437940}, doi = {10.1109/ISIT.2018.8437940}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/DeneuvilleGGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EkdahlJMY18, author = {Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang}, title = {A new {SNOW} stream cipher called {SNOW-V}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1143}, year = {2018}, url = {https://eprint.iacr.org/2018/1143}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EkdahlJMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NilssonJS18, author = {Alexander Nilsson and Thomas Johansson and Paul Stankovski}, title = {Error Amplification in Code-based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1223}, year = {2018}, url = {https://eprint.iacr.org/2018/1223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NilssonJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CharpinJKST17, author = {Pascale Charpin and Thomas Johansson and Gohar M. Kyureghyan and Nicolas Sendrier and Jean{-}Pierre Tillich}, title = {Editorial: Special issue on coding and cryptography}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {1-2}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0307-3}, doi = {10.1007/S10623-016-0307-3}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CharpinJKST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/00010MS17, author = {Qian Guo and Thomas Johansson and Erik M{\aa}rtensson and Paul Stankovski}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Coded-BKW with Sieving}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {323--346}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_12}, doi = {10.1007/978-3-319-70694-8\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/00010MS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/00010MS17, author = {Qian Guo and Thomas Johansson and Erik M{\aa}rtensson and Paul Stankovski}, title = {Information set decoding with soft information and some cryptographic applications}, booktitle = {2017 {IEEE} International Symposium on Information Theory, {ISIT} 2017, Aachen, Germany, June 25-30, 2017}, pages = {1793--1797}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISIT.2017.8006838}, doi = {10.1109/ISIT.2017.8006838}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/00010MS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/FabsicHSZG017, author = {Tom{\'{a}}s Fabsic and Viliam Hromada and Paul Stankovski and Pavol Zajac and Qian Guo and Thomas Johansson}, editor = {Tanja Lange and Tsuyoshi Takagi}, title = {A Reaction Attack on the {QC-LDPC} McEliece Cryptosystem}, booktitle = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10346}, pages = {51--68}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59879-6\_4}, doi = {10.1007/978-3-319-59879-6\_4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/FabsicHSZG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FabsicHSZG017, author = {Tom{\'{a}}s Fabsic and Viliam Hromada and Paul Stankovski and Pavol Zajac and Qian Guo and Thomas Johansson}, title = {A Reaction Attack on the {QC-LDPC} McEliece Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2017}, url = {http://eprint.iacr.org/2017/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FabsicHSZG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Londahl0SAA16, author = {Carl L{\"{o}}ndahl and Thomas Johansson and Masoumeh Koochak Shooshtari and Mahmoud Ahmadian{-}Attari and Mohammad Reza Aref}, title = {Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {359--377}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0099-x}, doi = {10.1007/S10623-015-0099-X}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Londahl0SAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ShooshtariAJA16, author = {Masoumeh Koochak Shooshtari and Mahmoud Ahmadian{-}Attari and Thomas Johansson and Mohammad Reza Aref}, title = {Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {4}, pages = {194--202}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0064}, doi = {10.1049/IET-IFS.2015.0064}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/ShooshtariAJA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Guo0S16, author = {Qian Guo and Thomas Johansson and Paul Stankovski}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {A Key Recovery Attack on {MDPC} with {CCA} Security Using Decoding Errors}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {789--815}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_29}, doi = {10.1007/978-3-662-53887-6\_29}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Guo0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Guo016, author = {Qian Guo and Thomas Johansson}, title = {A p-ary {MDPC} scheme}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {1356--1360}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541520}, doi = {10.1109/ISIT.2016.7541520}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/Guo016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Guo016, author = {Qian Guo and Thomas Johansson}, title = {A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2016}, url = {http://eprint.iacr.org/2016/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Guo016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Guo0S16, author = {Qian Guo and Thomas Johansson and Paul Stankovski}, title = {Coded-BKW: Solving {LWE} Using Lattice Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2016}, url = {http://eprint.iacr.org/2016/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Guo0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Guo0S16a, author = {Qian Guo and Thomas Johansson and Paul Stankovski}, title = {A Key Recovery Attack on {MDPC} with {CCA} Security Using Decoding Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {858}, year = {2016}, url = {http://eprint.iacr.org/2016/858}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Guo0S16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangSJ15, author = {Hui Wang and Paul Stankovski and Thomas Johansson}, title = {A generalized birthday approach for efficiently finding linear relations in {\(\mathscr{l}\)}-sequences}, journal = {Des. Codes Cryptogr.}, volume = {74}, number = {1}, pages = {41--57}, year = {2015}, url = {https://doi.org/10.1007/s10623-013-9845-0}, doi = {10.1007/S10623-013-9845-0}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WangSJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GuoJL15, author = {Qian Guo and Thomas Johansson and Carl L{\"{o}}ndahl}, title = {A New Algorithm for Solving Ring-LPN With a Reducible Polynomial}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {11}, pages = {6204--6212}, year = {2015}, url = {https://doi.org/10.1109/TIT.2015.2475738}, doi = {10.1109/TIT.2015.2475738}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GuoJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuoJS15, author = {Qian Guo and Thomas Johansson and Paul Stankovski}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Coded-BKW: Solving {LWE} Using Lattice Codes}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {23--42}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_2}, doi = {10.1007/978-3-662-47989-6\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GuoJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LondahlJ14, author = {Carl L{\"{o}}ndahl and Thomas Johansson}, title = {Improved algorithms for finding low-weight polynomial multiples in F\({}_{\mbox{2}}\)[x] and some cryptographic applications}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {625--640}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9960-6}, doi = {10.1007/S10623-014-9960-6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LondahlJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/StankovskiHJ14, author = {Paul Stankovski and Martin Hell and Thomas Johansson}, title = {An Efficient State Recovery Attack on the {X-FCSR} Family of Stream Ciphers}, journal = {J. Cryptol.}, volume = {27}, number = {1}, pages = {1--22}, year = {2014}, url = {https://doi.org/10.1007/s00145-012-9130-9}, doi = {10.1007/S00145-012-9130-9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/StankovskiHJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GuoJL14, author = {Qian Guo and Thomas Johansson and Carl L{\"{o}}ndahl}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Solving {LPN} Using Covering Codes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {1--20}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_1}, doi = {10.1007/978-3-662-45611-8\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GuoJL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GuoJL14, author = {Qian Guo and Thomas Johansson and Carl L{\"{o}}ndahl}, title = {A New Algorithm for Solving Ring-LPN with a Reducible Polynomial}, journal = {CoRR}, volume = {abs/1409.0472}, year = {2014}, url = {http://arxiv.org/abs/1409.0472}, eprinttype = {arXiv}, eprint = {1409.0472}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GuoJL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangHJA13, author = {Hui Wang and Martin Hell and Thomas Johansson and Martin {\AA}gren}, title = {Improved Key Recovery Attack on the {BEAN} Stream Cipher}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {6}, pages = {1437--1444}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.1437}, doi = {10.1587/TRANSFUN.E96.A.1437}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WangHJA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2013, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9}, doi = {10.1007/978-3-642-38348-9}, isbn = {978-3-642-38347-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AgrenLHJ12, author = {Martin {\AA}gren and Carl L{\"{o}}ndahl and Martin Hell and Thomas Johansson}, title = {A survey on fast correlation attacks}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {173--202}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0062-x}, doi = {10.1007/S12095-012-0062-X}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/AgrenLHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/StankovskiRHJ12, author = {Paul Stankovski and Sushmita Ruj and Martin Hell and Thomas Johansson}, title = {Improved distinguishers for {HC-128}}, journal = {Des. Codes Cryptogr.}, volume = {63}, number = {2}, pages = {225--240}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9550-9}, doi = {10.1007/S10623-011-9550-9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/StankovskiRHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WangJK12, author = {Qichun Wang and Thomas Johansson and Haibin Kan}, title = {Some results on fast algebraic attacks and higher-order non-linearities}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {1}, pages = {41--46}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0090}, doi = {10.1049/IET-IFS.2011.0090}, timestamp = {Mon, 25 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/WangJK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AgrenHJ12, author = {Martin {\AA}gren and Martin Hell and Thomas Johansson}, title = {On hardware-oriented message authentication}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {329--336}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0221}, doi = {10.1049/IET-IFS.2011.0221}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AgrenHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HellJBE12, author = {Martin Hell and Thomas Johansson and Lennart Brynielsson and H{\aa}kan Englund}, title = {Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {9}, pages = {6183--6193}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2202212}, doi = {10.1109/TIT.2012.2202212}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/HellJBE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/StankovskiHJ12, author = {Paul Stankovski and Martin Hell and Thomas Johansson}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Analysis of Xorrotation with Application to an {HC-128} Variant}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {419--425}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_31}, doi = {10.1007/978-3-642-31448-3\_31}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/StankovskiHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LondahlJ12, author = {Carl L{\"{o}}ndahl and Thomas Johansson}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {A New Version of McEliece {PKC} Based on Convolutional Codes}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {461--470}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_45}, doi = {10.1007/978-3-642-34129-8\_45}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LondahlJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istc/AgrenH0L12, author = {Martin {\AA}gren and Martin Hell and Thomas Johansson and Carl L{\"{o}}ndahl}, title = {Improved message passing techniques in fast correlation attacks on stream ciphers}, booktitle = {7th International Symposium on Turbo Codes and Iterative Information Processing, {ISTC} 2012, August 27-31, 2012, Gothenburg, Sweden}, pages = {260--264}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISTC.2012.6325183}, doi = {10.1109/ISTC.2012.6325183}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/istc/AgrenH0L12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/MartucciZSHJS12, author = {Leonardo A. Martucci and Albin Zuccato and Ben J. M. Smeets and Sheikh Mahbub Habib and Thomas Johansson and Nahid Shahmehri}, editor = {Bernady O. Apduhan and Ching{-}Hsien Hsu and Tadashi Dohi and Kenji Ishida and Laurence Tianruo Yang and Jianhua Ma}, title = {Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry}, booktitle = {9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, {UIC/ATC} 2012, Fukuoka, Japan, September 4-7, 2012}, pages = {627--632}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/UIC-ATC.2012.166}, doi = {10.1109/UIC-ATC.2012.166}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/MartucciZSHJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2012, editor = {David Pointcheval and Thomas Johansson}, title = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4}, doi = {10.1007/978-3-642-29011-4}, isbn = {978-3-642-29010-7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/AgrenHJM11, author = {Martin {\AA}gren and Martin Hell and Thomas Johansson and Willi Meier}, title = {Grain-128a: a new version of Grain-128 with optional authentication}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {5}, number = {1}, pages = {48--59}, year = {2011}, url = {https://doi.org/10.1504/IJWMC.2011.044106}, doi = {10.1504/IJWMC.2011.044106}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijwmc/AgrenHJM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HellJ11, author = {Martin Hell and Thomas Johansson}, title = {Breaking the Stream Ciphers {F-FCSR-H} and {F-FCSR-16} in Real Time}, journal = {J. Cryptol.}, volume = {24}, number = {3}, pages = {427--445}, year = {2011}, url = {https://doi.org/10.1007/s00145-009-9053-2}, doi = {10.1007/S00145-009-9053-2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/HellJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AgrenJ11, author = {Martin {\AA}gren and Thomas Johansson}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {114--133}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_10}, doi = {10.1007/978-3-642-25578-6\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AgrenJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrenJ11, author = {Martin {\AA}gren and Thomas Johansson}, title = {Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2011}, url = {http://eprint.iacr.org/2011/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrenJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangJ10, author = {Qichun Wang and Thomas Johansson}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {A Note on Fast Algebraic Attacks and Higher Order Nonlinearities}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {404--414}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_28}, doi = {10.1007/978-3-642-21518-6\_28}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WangJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WangJ10, author = {Qichun Wang and Thomas Johansson}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {On Equivalence Classes of Boolean Functions}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {311--324}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_21}, doi = {10.1007/978-3-642-24209-0\_21}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/WangJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HellJB09, author = {Martin Hell and Thomas Johansson and Lennart Brynielsson}, title = {An overview of distinguishing attacks on stream ciphers}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {71--94}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0006-7}, doi = {10.1007/S12095-008-0006-7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/HellJB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AgrenJH09, author = {Martin {\AA}gren and Thomas Johansson and Martin Hell}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Improving the Rainbow Attack by Reusing Colours}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {362--378}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_24}, doi = {10.1007/978-3-642-10433-6\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/AgrenJH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/StankovskiHJ09, author = {Paul Stankovski and Martin Hell and Thomas Johansson}, editor = {Orr Dunkelman}, title = {An Efficient State Recovery Attack on {X-FCSR-256}}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {23--37}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_2}, doi = {10.1007/978-3-642-03317-9\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/StankovskiHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HellJ08, author = {Martin Hell and Thomas Johansson}, editor = {Josef Pieprzyk}, title = {Breaking the {F-FCSR-H} Stream Cipher in Real Time}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {557--569}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_34}, doi = {10.1007/978-3-540-89255-7\_34}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HellJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/HellJMM08, author = {Martin Hell and Thomas Johansson and Alexander Maximov and Willi Meier}, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {The Grain Family of Stream Ciphers}, booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, pages = {179--190}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3\_14}, doi = {10.1007/978-3-540-68351-3\_14}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/series/lncs/HellJMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HellJ07, author = {Martin Hell and Thomas Johansson}, title = {Cryptanalysis of Achterbahn-128/80}, journal = {{IET} Inf. Secur.}, volume = {1}, number = {2}, pages = {47--52}, year = {2007}, url = {https://doi.org/10.1049/iet-ifs:20060153}, doi = {10.1049/IET-IFS:20060153}, timestamp = {Mon, 25 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/HellJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/HellJM07, author = {Martin Hell and Thomas Johansson and Willi Meier}, title = {Grain: a stream cipher for constrained environments}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {2}, number = {1}, pages = {86--93}, year = {2007}, url = {https://doi.org/10.1504/IJWMC.2007.013798}, doi = {10.1504/IJWMC.2007.013798}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijwmc/HellJM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MaximovJ07, author = {Alexander Maximov and Thomas Johansson}, title = {A Linear Distinguishing Attack on Scream}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {9}, pages = {3127--3144}, year = {2007}, url = {https://doi.org/10.1109/TIT.2007.903131}, doi = {10.1109/TIT.2007.903131}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MaximovJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HellJ07, author = {Martin Hell and Thomas Johansson}, editor = {Kaoru Kurosawa}, title = {A Key Recovery Attack on Edon80}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {568--581}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_35}, doi = {10.1007/978-3-540-76900-2\_35}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HellJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EnglundHJ07, author = {H{\aa}kan Englund and Martin Hell and Thomas Johansson}, editor = {Alex Biryukov}, title = {Two General Attacks on Pomaranch-Like Keystream Generators}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {274--289}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_18}, doi = {10.1007/978-3-540-74619-5\_18}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/EnglundHJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/EnglundJT07, author = {H{\aa}kan Englund and Thomas Johansson and Meltem S{\"{o}}nmez Turan}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {A Framework for Chosen {IV} Statistical Analysis of Stream Ciphers}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {268--281}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_20}, doi = {10.1007/978-3-540-77026-8\_20}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/EnglundJT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/EnglundH007, author = {H{\aa}kan Englund and Martin Hell and Thomas Johansson}, editor = {Tor Helleseth and P. Vijay Kumar and {\O}yvind Ytrehus}, title = {A Note on Distinguishing Attacks}, booktitle = {Proceedings of the {IEEE} Information Theory Workshop on Information Theory for Wireless Networks, July 1-6, 2007, Solstrand, Norway}, pages = {1--4}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ITWITWN.2007.4318038}, doi = {10.1109/ITWITWN.2007.4318038}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itw/EnglundH007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/EnglundJ06, author = {H{\aa}kan Englund and Thomas Johansson}, title = {Three ways to mount distinguishing attacks on irregularly clocked stream ciphers}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {95--102}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010826}, doi = {10.1504/IJSN.2006.010826}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/EnglundJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HellJ06, author = {Martin Hell and Thomas Johansson}, title = {Two New Attacks on the Self-Shrinking Generator}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {8}, pages = {3837--3843}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.878233}, doi = {10.1109/TIT.2006.878233}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/HellJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JohanssonMM06, author = {Thomas Johansson and Willi Meier and Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Matthew J. B. Robshaw}, title = {Cryptanalysis of Achterbahn}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {1--14}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_1}, doi = {10.1007/11799313\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/JohanssonMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Hell0MM06, author = {Martin Hell and Thomas Johansson and Alexander Maximov and Willi Meier}, title = {A Stream Cipher Proposal: Grain-128}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {1614--1618}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261549}, doi = {10.1109/ISIT.2006.261549}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/Hell0MM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HellJ06, author = {Martin Hell and Thomas Johansson}, editor = {Eli Biham and Amr M. Youssef}, title = {Cryptanalysis of Achterbahn-Version 2}, booktitle = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, pages = {45--55}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74462-7\_4}, doi = {10.1007/978-3-540-74462-7\_4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/HellJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HellJ06a, author = {Martin Hell and Thomas Johansson}, editor = {Eli Biham and Amr M. Youssef}, title = {On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2}, booktitle = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, pages = {220--233}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74462-7\_16}, doi = {10.1007/978-3-540-74462-7\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HellJ06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MaximovJ05, author = {Alexander Maximov and Thomas Johansson}, editor = {Bimal K. Roy}, title = {Fast Computation of Large Distributions and Its Cryptographic Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {313--332}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_17}, doi = {10.1007/11593447\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MaximovJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/FangJS05, author = {Wenhai Fang and Thomas Johansson and Lambert Spaanenburg}, editor = {Tero Rissa and Steven J. E. Wilton and Philip Heng Wai Leong}, title = {Snow 2.0 {IP} Core for Trusted Hardware}, booktitle = {Proceedings of the 2005 International Conference on Field Programmable Logic and Applications (FPL), Tampere, Finland, August 24-26, 2005}, pages = {281--286}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/FPL.2005.1515735}, doi = {10.1109/FPL.2005.1515735}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/FangJS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EnglundJ05, author = {H{\aa}kan Englund and Thomas Johansson}, editor = {Henri Gilbert and Helena Handschuh}, title = {A New Distinguisher for Clock Controlled Stream Ciphers}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {181--195}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_12}, doi = {10.1007/11502760\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/EnglundJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HellJ05, author = {Martin Hell and Thomas Johansson}, editor = {Henri Gilbert and Helena Handschuh}, title = {Some Attacks on the Bit-Search Generator}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {215--227}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_14}, doi = {10.1007/11502760\_14}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/HellJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/TrofimovJ04, author = {A. Trofimov and Thomas Johansson}, title = {A memory-efficient optimal {APP} symbol-decoding algorithm for linear block codes}, journal = {{IEEE} Trans. Commun.}, volume = {52}, number = {9}, pages = {1429--1434}, year = {2004}, url = {https://doi.org/10.1109/TCOMM.2004.833067}, doi = {10.1109/TCOMM.2004.833067}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/TrofimovJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EnglundHJ04, author = {H{\aa}kan Englund and Martin Hell and Thomas Johansson}, editor = {Bimal K. Roy and Willi Meier}, title = {Correlation Attacks Using a New Class of Weak Feedback Polynomials}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {127--142}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_9}, doi = {10.1007/978-3-540-25937-4\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/EnglundHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MaximovJB04, author = {Alexander Maximov and Thomas Johansson and Steve Babbage}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {An Improved Correlation Attack on {A5/1}}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {1--18}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_1}, doi = {10.1007/978-3-540-30564-4\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/MaximovJB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/EnglundJ04, author = {H{\aa}kan Englund and Thomas Johansson}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {A New Simple Technique to Attack Filter Generators and Related Ciphers}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {39--53}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_3}, doi = {10.1007/978-3-540-30564-4\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/EnglundJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/EkdahlJ03, author = {Patrik Ekdahl and Thomas Johansson}, title = {Another attack on {A5/1}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {49}, number = {1}, pages = {284--289}, year = {2003}, url = {https://doi.org/10.1109/TIT.2002.806129}, doi = {10.1109/TIT.2002.806129}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/EkdahlJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/JohanssonP03, author = {Thomas Johansson and Enes Pasalic}, title = {A construction of resilient functions with high nonlinearity}, journal = {{IEEE} Trans. Inf. Theory}, volume = {49}, number = {2}, pages = {494--501}, year = {2003}, url = {https://doi.org/10.1109/TIT.2002.807297}, doi = {10.1109/TIT.2002.807297}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/JohanssonP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EkdahlMJ03, author = {Patrik Ekdahl and Willi Meier and Thomas Johansson}, editor = {Eli Biham}, title = {Predicting the Shrinking Generator with Fixed Connections}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {330--344}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_20}, doi = {10.1007/3-540-39200-9\_20}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/EkdahlMJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Johansson03, author = {Thomas Johansson}, editor = {Kenneth G. Paterson}, title = {Analysis and Design of Modern Stream Ciphers: (Invited Paper) p}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {66}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_6}, doi = {10.1007/978-3-540-40974-8\_6}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/Johansson03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2003, editor = {Thomas Johansson}, title = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b93938}, doi = {10.1007/B93938}, isbn = {3-540-20449-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2003, editor = {Thomas Johansson and Subhamoy Maitra}, title = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b94593}, doi = {10.1007/B94593}, isbn = {3-540-20609-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/JonssonJ02, author = {Fredrik J{\"{o}}nsson and Thomas Johansson}, title = {A fast correlation attack on {LILI-128}}, journal = {Inf. Process. Lett.}, volume = {81}, number = {3}, pages = {127--132}, year = {2002}, url = {https://doi.org/10.1016/S0020-0190(01)00208-3}, doi = {10.1016/S0020-0190(01)00208-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/JonssonJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/poit/Ourivski002, author = {Alexei V. Ourivski and Thomas Johansson}, title = {New Technique for Decoding Codes in the Rank Metric and Its Cryptography Applications}, journal = {Probl. Inf. Transm.}, volume = {38}, number = {3}, pages = {237--246}, year = {2002}, url = {https://doi.org/10.1023/A\%3A1020369320078}, doi = {10.1023/A\%3A1020369320078}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/poit/Ourivski002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/JohanssonJ02, author = {Thomas Johansson and Fredrik J{\"{o}}nsson}, title = {Theoretical analysis of a correlation attack based on convolutional codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {48}, number = {8}, pages = {2173--2181}, year = {2002}, url = {https://doi.org/10.1109/TIT.2002.800494}, doi = {10.1109/TIT.2002.800494}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/JohanssonJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/JohanssonJ02a, author = {Thomas Johansson and Fredrik J{\"{o}}nsson}, title = {On the complexity of some cryptographic problems based on the general decoding problem}, journal = {{IEEE} Trans. Inf. Theory}, volume = {48}, number = {10}, pages = {2669--2678}, year = {2002}, url = {https://doi.org/10.1109/TIT.2002.802608}, doi = {10.1109/TIT.2002.802608}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/JohanssonJ02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EkdahlJ02, author = {Patrik Ekdahl and Thomas Johansson}, editor = {Joan Daemen and Vincent Rijmen}, title = {Distinguishing Attacks on SOBER-t16 and t32}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {210--224}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_16}, doi = {10.1007/3-540-45661-9\_16}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/EkdahlJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MaityJ02, author = {Soumen Maity and Thomas Johansson}, editor = {Alfred Menezes and Palash Sarkar}, title = {Construction of Cryptographically Important Boolean Functions}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {234--245}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_19}, doi = {10.1007/3-540-36231-2\_19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/MaityJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/EkdahlJ02, author = {Patrik Ekdahl and Thomas Johansson}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {A New Version of the Stream Cipher {SNOW}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {47--61}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_5}, doi = {10.1007/3-540-36492-7\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/EkdahlJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/endm/PasalicMJS01, author = {Emir Pasalic and Subhamoy Maitra and Thomas Johansson and Palash Sarkar}, title = {New Constructions of Resilient and Correlation Immune Boolean Functions Achieving Upper Bound on Nonlinearity}, journal = {Electron. Notes Discret. Math.}, volume = {6}, pages = {158--167}, year = {2001}, url = {https://doi.org/10.1016/S1571-0653(04)00167-2}, doi = {10.1016/S1571-0653(04)00167-2}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/endm/PasalicMJS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KurosawaJS01, author = {Kaoru Kurosawa and Thomas Johansson and Douglas R. Stinson}, title = {Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications}, journal = {J. Cryptol.}, volume = {14}, number = {4}, pages = {231--253}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0010-y}, doi = {10.1007/S00145-001-0010-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KurosawaJS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JohanssonJ00, author = {Thomas Johansson and Fredrik J{\"{o}}nsson}, editor = {Mihir Bellare}, title = {Fast Correlation Attacks through Reconstruction of Linear Polynomials}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {300--315}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_19}, doi = {10.1007/3-540-44598-6\_19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/JohanssonJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChepyzhovJS00, author = {Vladimir V. Chepyzhov and Thomas Johansson and Ben J. M. Smeets}, editor = {Bruce Schneier}, title = {A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {181--195}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_13}, doi = {10.1007/3-540-44706-7\_13}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/ChepyzhovJS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PasalicJMS00, author = {Enes Pasalic and Thomas Johansson and Subhamoy Maitra and Palash Sarkar}, title = {New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2000}, url = {http://eprint.iacr.org/2000/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PasalicJMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JohanssonP00, author = {Thomas Johansson and Enes Pasalic}, title = {A Construction of Resilient Functions with High Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2000}, url = {http://eprint.iacr.org/2000/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JohanssonP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Johansson99, author = {Thomas Johansson}, title = {Further Results on Asymmetric Authentication Schemes}, journal = {Inf. Comput.}, volume = {151}, number = {1-2}, pages = {100--133}, year = {1999}, url = {https://doi.org/10.1006/inco.1998.2767}, doi = {10.1006/INCO.1998.2767}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Johansson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JohanssonJ99, author = {Thomas Johansson and Fredrik J{\"{o}}nsson}, editor = {Michael J. Wiener}, title = {Fast Correlation Attacks Based on Turbo Code Techniques}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {181--197}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_12}, doi = {10.1007/3-540-48405-1\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/JohanssonJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JohanssonJ99, author = {Thomas Johansson and Fredrik J{\"{o}}nsson}, editor = {Jacques Stern}, title = {Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {347--362}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_24}, doi = {10.1007/3-540-48910-X\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JohanssonJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/PasalicJ99, author = {Enes Pasalic and Thomas Johansson}, editor = {Michael Walker}, title = {Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions}, booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester, UK, December 20-22, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1746}, pages = {35--44}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46665-7\_3}, doi = {10.1007/3-540-46665-7\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/PasalicJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/JohanssonZ98, author = {Thomas Johansson and Kamil Sh. Zigangirov}, title = {A Simple One-Sweep Algorithm for Optimal {APP} Symbol Decoding of Linear Block Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {44}, number = {7}, pages = {3124--3129}, year = {1998}, url = {https://doi.org/10.1109/18.737541}, doi = {10.1109/18.737541}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/JohanssonZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Johansson98, author = {Thomas Johansson}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {342--356}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_27}, doi = {10.1007/3-540-49649-1\_27}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Johansson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Johansson97, author = {Thomas Johansson}, editor = {Walter Fumy}, title = {Bucket Hashing with a Small Key Size}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {149--162}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_12}, doi = {10.1007/3-540-69053-0\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Johansson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaJS97, author = {Kaoru Kurosawa and Thomas Johansson and Douglas R. Stinson}, editor = {Walter Fumy}, title = {Almost k-wise Independent Sample Spaces and Their Cryptologic Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {409--421}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_28}, doi = {10.1007/3-540-69053-0\_28}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaJS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KabatianskiiSJ96, author = {Gregory Kabatianskii and Ben J. M. Smeets and Thomas Johansson}, title = {On the cardinality of systematic authentication codes via error-correcting codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {42}, number = {2}, pages = {566--578}, year = {1996}, url = {https://doi.org/10.1109/18.485725}, doi = {10.1109/18.485725}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KabatianskiiSJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HellesethJ96, author = {Tor Helleseth and Thomas Johansson}, editor = {Neal Koblitz}, title = {Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {31--44}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_3}, doi = {10.1007/3-540-68697-5\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/HellesethJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Johansson95, author = {Thomas Johansson}, title = {Authentication Codes for Nontrusting Parties Obtained from Rank Metric Codes}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {3}, pages = {205--218}, year = {1995}, url = {https://doi.org/10.1007/BF01388475}, doi = {10.1007/BF01388475}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Johansson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Johansson94, author = {Thomas Johansson}, title = {A Shift Register Construction of Unconditionally Secure Authentication Codes}, journal = {Des. Codes Cryptogr.}, volume = {4}, number = {1}, pages = {69--81}, year = {1994}, url = {https://doi.org/10.1007/BF01388561}, doi = {10.1007/BF01388561}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Johansson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Johansson94, author = {Thomas Johansson}, title = {Lower bounds on the probability of deception in authentication with arbitration}, journal = {{IEEE} Trans. Inf. Theory}, volume = {40}, number = {5}, pages = {1573--1585}, year = {1994}, url = {https://doi.org/10.1109/18.333869}, doi = {10.1109/18.333869}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Johansson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JohanssonS94, author = {Thomas Johansson and Ben J. M. Smeets}, editor = {Alfredo De Santis}, title = {On A{\({^2}\)}-Codes Including Arbiter's Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {456--460}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053463}, doi = {10.1007/BFB0053463}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JohanssonS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/JohanssonB94, author = {Thomas Johansson and Ewert Bengtsson}, title = {Parallel algorithms on compact binary objects}, booktitle = {12th {IAPR} International Conference on Pattern Recognition, Conference {C:} Signal Processing / Conference {D:} Parallel Computing, {ICPR} 1994, Jerusalem, Israel, 9-13 October, 1994, Volume 3}, pages = {370--372}, publisher = {{IEEE}}, year = {1994}, url = {https://doi.org/10.1109/ICPR.1994.577206}, doi = {10.1109/ICPR.1994.577206}, timestamp = {Thu, 28 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpr/JohanssonB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/parle/JohanssonB94, author = {Thomas Johansson and Ewert Bengtsson}, editor = {Constantine Halatsis and Dimitris G. Maritsas and George Philokyprou and Sergios Theodoridis}, title = {A New Parallel {MIMD} Connected Component Labeling Algorithm}, booktitle = {{PARLE} '94: Parallel Architectures and Languages Europe, 6th International {PARLE} Conference, Athens, Greece, July 4-8, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {817}, pages = {801--804}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58184-7\_161}, doi = {10.1007/3-540-58184-7\_161}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/parle/JohanssonB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BierbrauerJKS93, author = {J{\"{u}}rgen Bierbrauer and Thomas Johansson and Gregory Kabatianskii and Ben J. M. Smeets}, editor = {Douglas R. Stinson}, title = {On Families of Hash Functions via Geometric Codes and Concatenation}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {331--342}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_28}, doi = {10.1007/3-540-48329-2\_28}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BierbrauerJKS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Johansson93, author = {Thomas Johansson}, editor = {Douglas R. Stinson}, title = {On the Construction of Perfect Authentication Codes that Permit Arbitration}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {343--354}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_29}, doi = {10.1007/3-540-48329-2\_29}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Johansson93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JohanssonKS93, author = {Thomas Johansson and Gregory Kabatianskii and Ben J. M. Smeets}, editor = {Tor Helleseth}, title = {On the Relation between A-Codes and Codes Correcting Independent Errors}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {1--11}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_1}, doi = {10.1007/3-540-48285-7\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JohanssonKS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.