BibTeX records: Thomas Johansson 0001

download as .bib file

@inproceedings{DBLP:conf/uss/0001NS024,
  author       = {Qian Guo and
                  Denis Nabokov and
                  Elias Suvanto and
                  Thomas Johansson},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case
                  Noise Flooding Countermeasures},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/guo-qian},
  timestamp    = {Mon, 22 Jul 2024 17:10:49 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001NS024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangMEJ24,
  author       = {Dachao Wang and
                  Alexander Maximov and
                  Patrik Ekdahl and
                  Thomas Johansson},
  title        = {A new stand-alone {MAC} construct called {SMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {819},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/819},
  timestamp    = {Mon, 01 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangMEJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NgoDJ23,
  author       = {Kalle Ngo and
                  Elena Dubrova and
                  Thomas Johansson},
  title        = {A side-channel attack on a masked and shuffled software implementation
                  of Saber},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {4},
  pages        = {443--460},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00315-3},
  doi          = {10.1007/S13389-023-00315-3},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NgoDJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HuangSC0023,
  author       = {Senyang Huang and
                  Rui Qi Sim and
                  Chitchanok Chuengsatiansup and
                  Qian Guo and
                  Thomas Johansson},
  title        = {Cache-Timing Attack Against {HQC}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {136--163},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.136-163},
  doi          = {10.46586/TCHES.V2023.I3.136-163},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HuangSC0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GuoNNJ23,
  author       = {Qian Guo and
                  Denis Nabokov and
                  Alexander Nilsson and
                  Thomas Johansson},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {{SCA-LDPC:} {A} Code-Based Framework for Key-Recovery Side-Channel
                  Attacks on Post-quantum Encryption Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14441},
  pages        = {203--236},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8730-6\_7},
  doi          = {10.1007/978-981-99-8730-6\_7},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GuoNNJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/JohanssonMN23,
  author       = {Thomas Johansson and
                  Willi Meier and
                  Vu Nguyen},
  title        = {Differential cryptanalysis of Mod-2/Mod-3 constructions of binary
                  weak PRFs},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2023,
                  Taipei, Taiwan, June 25-30, 2023},
  pages        = {477--482},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISIT54713.2023.10206853},
  doi          = {10.1109/ISIT54713.2023.10206853},
  timestamp    = {Mon, 28 Aug 2023 17:20:14 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/JohanssonMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2023,
  editor       = {Thomas Johansson and
                  Daniel Smith{-}Tone},
  title        = {Post-Quantum Cryptography - 14th International Workshop, PQCrypto
                  2023, College Park, MD, USA, August 16-18, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14154},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-40003-2},
  doi          = {10.1007/978-3-031-40003-2},
  isbn         = {978-3-031-40002-5},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangSCGJ23,
  author       = {Senyang Huang and
                  Rui Qi Sim and
                  Chitchanok Chuengsatiansup and
                  Qian Guo and
                  Thomas Johansson},
  title        = {Cache-timing attack against {HQC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/102},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangSCGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoJN23,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Vu Nguyen},
  title        = {A New Sieving-Style Information-Set Decoding Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/247},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoJN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoNNJ23,
  author       = {Qian Guo and
                  Denis Nabokov and
                  Alexander Nilsson and
                  Thomas Johansson},
  title        = {{SCA-LDPC:} {A} Code-Based Framework for Key-Recovery Side-Channel
                  Attacks on Post-Quantum Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/294},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoNNJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuoHJLNS22,
  author       = {Qian Guo and
                  Clemens Hlauschek and
                  Thomas Johansson and
                  Norman Lahr and
                  Alexander Nilsson and
                  Robin Leander Schr{\"{o}}der},
  title        = {Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling
                  in {HQC} and {BIKE}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {223--263},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.223-263},
  doi          = {10.46586/TCHES.V2022.I3.223-263},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/GuoHJLNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuoJJ22,
  author       = {Qian Guo and
                  Andreas Johansson and
                  Thomas Johansson},
  title        = {A Key-Recovery Side-Channel Attack on Classic McEliece Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {800--827},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.800-827},
  doi          = {10.46586/TCHES.V2022.I4.800-827},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GuoJJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/YangGJL22,
  author       = {Jing Yang and
                  Qian Guo and
                  Thomas Johansson and
                  Michael Lentmaier},
  title        = {Revisiting the Concrete Security of Goldreich's Pseudorandom Generator},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {68},
  number       = {2},
  pages        = {1329--1354},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIT.2021.3128315},
  doi          = {10.1109/TIT.2021.3128315},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/YangGJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/JohanssonMN22,
  author       = {Thomas Johansson and
                  Willi Meier and
                  Vu Nguyen},
  title        = {Attacks on the Firekite Cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {191--216},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.191-216},
  doi          = {10.46586/TOSC.V2022.I3.191-216},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/JohanssonMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2022,
  editor       = {Jung Hee Cheon and
                  Thomas Johansson},
  title        = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto
                  2022, Virtual Event, September 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13512},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17234-2},
  doi          = {10.1007/978-3-031-17234-2},
  isbn         = {978-3-031-17233-5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JohanssonMN22,
  author       = {Thomas Johansson and
                  Willi Meier and
                  Vu Nguyen},
  title        = {Attacks on the Firekite cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/148},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JohanssonMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoJJ22,
  author       = {Qian Guo and
                  Andreas Johansson and
                  Thomas Johansson},
  title        = {A Key-Recovery Side-Channel Attack on Classic McEliece},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/514},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoJJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BudroniGJMW21,
  author       = {Alessandro Budroni and
                  Qian Guo and
                  Thomas Johansson and
                  Erik M{\aa}rtensson and
                  Paul Stankovski Wagner},
  title        = {Improvements on Making {BKW} Practical for Solving {LWE}},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {31},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040031},
  doi          = {10.3390/CRYPTOGRAPHY5040031},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BudroniGJMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NgoDGJ21,
  author       = {Kalle Ngo and
                  Elena Dubrova and
                  Qian Guo and
                  Thomas Johansson},
  title        = {A Side-Channel Attack on a Masked {IND-CCA} Secure Saber {KEM} Implementation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {676--707},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.676-707},
  doi          = {10.46586/TCHES.V2021.I4.676-707},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/NgoDGJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/00250M21,
  author       = {Jing Yang and
                  Thomas Johansson and
                  Alexander Maximov},
  title        = {Improved guess-and-determine and distinguishing attacks on {SNOW-V}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {3},
  pages        = {54--83},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i3.54-83},
  doi          = {10.46586/TOSC.V2021.I3.54-83},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/00250M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GuoJ21,
  author       = {Qian Guo and
                  Thomas Johansson},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Faster Dual Lattice Attacks for Solving {LWE} with Applications to
                  {CRYSTALS}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {33--62},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_2},
  doi          = {10.1007/978-3-030-92068-5\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GuoJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/HellJMMY21,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Alexander Maximov and
                  Willi Meier and
                  Hirotaka Yoshida},
  editor       = {Mauro Conti and
                  Marc Stevens and
                  Stephan Krenn},
  title        = {Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction},
  booktitle    = {Cryptology and Network Security - 20th International Conference, {CANS}
                  2021, Vienna, Austria, December 13-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13099},
  pages        = {24--41},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92548-2\_2},
  doi          = {10.1007/978-3-030-92548-2\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/HellJMMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NgoD021,
  author       = {Kalle Ngo and
                  Elena Dubrova and
                  Thomas Johansson},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Stefan Katzenbeisser and
                  Debdeep Mukhopadhyay},
  title        = {Breaking Masked and Shuffled {CCA} Secure Saber {KEM} by Power Analysis},
  booktitle    = {ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions
                  in Hardware Security, Virtual Event, Republic of Korea, 19 November
                  2021},
  pages        = {51--61},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474376.3487277},
  doi          = {10.1145/3474376.3487277},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NgoD021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/NilssonBK021,
  author       = {Alexander Nilsson and
                  Irina E. Bocharova and
                  Boris D. Kudryashov and
                  Thomas Johansson},
  title        = {A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2021,
                  Melbourne, Australia, July 12-20, 2021},
  pages        = {1266--1271},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISIT45174.2021.9517902},
  doi          = {10.1109/ISIT45174.2021.9517902},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/NilssonBK021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/EkdahlM0Y21,
  author       = {Patrik Ekdahl and
                  Alexander Maximov and
                  Thomas Johansson and
                  Jing Yang},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {SNOW-Vi: an extreme performance variant of {SNOW-V} for lower grade
                  CPUs},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {261--272},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467829},
  doi          = {10.1145/3448300.3467829},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/EkdahlM0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-02668,
  author       = {Jing Yang and
                  Qian Guo and
                  Thomas Johansson and
                  Michael Lentmaier},
  title        = {Revisiting the Concrete Security of Goldreich's Pseudorandom Generator},
  journal      = {CoRR},
  volume       = {abs/2103.02668},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.02668},
  eprinttype    = {arXiv},
  eprint       = {2103.02668},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-02668.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NgoDGJ21,
  author       = {Kalle Ngo and
                  Elena Dubrova and
                  Qian Guo and
                  Thomas Johansson},
  title        = {A Side-Channel Attack on a Masked {IND-CCA} Secure Saber {KEM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/079},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NgoDGJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ekdahl0MY21,
  author       = {Patrik Ekdahl and
                  Thomas Johansson and
                  Alexander Maximov and
                  Jing Yang},
  title        = {SNOW-Vi: an extreme performance variant of {SNOW-V} for low-end CPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/236},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ekdahl0MY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangJM21,
  author       = {Jing Yang and
                  Thomas Johansson and
                  Alexander Maximov},
  title        = {New improved attacks on {SNOW-V}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/544},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NilssonBKJ21,
  author       = {Alexander Nilsson and
                  Irina E. Bocharova and
                  Boris D. Kudryashov and
                  Thomas Johansson},
  title        = {A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/610},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NilssonBKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HellJMMY21,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Alexander Maximov and
                  Willi Meier and
                  Hirotaka Yoshida},
  title        = {Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/751},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HellJMMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NgoDJ21,
  author       = {Kalle Ngo and
                  Elena Dubrova and
                  Thomas Johansson},
  title        = {Breaking Masked and Shuffled {CCA} Secure Saber {KEM} by Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {902},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/902},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NgoDJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/YangJ20,
  author       = {Jing Yang and
                  Thomas Johansson},
  title        = {An overview of cryptographic primitives for possible use in 5G and
                  beyond},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {12},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-019-2907-4},
  doi          = {10.1007/S11432-019-2907-4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/YangJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GuoJL20,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Carl L{\"{o}}ndahl},
  title        = {Solving {LPN} Using Covering Codes},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {1},
  pages        = {1--33},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09338-8},
  doi          = {10.1007/S00145-019-09338-8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/GuoJL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/YangJM20,
  author       = {Jing Yang and
                  Thomas Johansson and
                  Alexander Maximov},
  title        = {Spectral analysis of {ZUC-256}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {266--288},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.266-288},
  doi          = {10.13154/TOSC.V2020.I1.266-288},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/YangJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Guo020,
  author       = {Qian Guo and
                  Thomas Johansson},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {A New Decryption Failure Attack Against {HQC}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {353--382},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_12},
  doi          = {10.1007/978-3-030-64837-4\_12},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Guo020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/00010N20,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Alexander Nilsson},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {A Key-Recovery Timing Attack on Post-quantum Primitives Using the
                  Fujisaki-Okamoto Transformation and Its Application on FrodoKEM},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {359--386},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_13},
  doi          = {10.1007/978-3-030-56880-1\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/00010N20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Budroni00MW20,
  author       = {Alessandro Budroni and
                  Qian Guo and
                  Thomas Johansson and
                  Erik M{\aa}rtensson and
                  Paul Stankovski Wagner},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Making the {BKW} Algorithm Practical for {LWE}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {417--439},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_19},
  doi          = {10.1007/978-3-030-65277-7\_19},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Budroni00MW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoJN20,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Alexander Nilsson},
  title        = {A key-recovery timing attack on post-quantum primitives using the
                  Fujisaki-Okamoto transformation and its application on FrodoKEM},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/743},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoJN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudroniGJMW20,
  author       = {Alessandro Budroni and
                  Qian Guo and
                  Thomas Johansson and
                  Erik M{\aa}rtensson and
                  Paul Stankovski Wagner},
  title        = {Making the {BKW} Algorithm Practical for {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1467},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1467},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BudroniGJMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/GuoJMW19,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Erik M{\aa}rtensson and
                  Paul Stankovski Wagner},
  title        = {Some cryptanalytic and coding-theoretic applications of a soft stern
                  algorithm},
  journal      = {Adv. Math. Commun.},
  volume       = {13},
  number       = {4},
  pages        = {559--578},
  year         = {2019},
  url          = {https://doi.org/10.3934/amc.2019035},
  doi          = {10.3934/AMC.2019035},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/GuoJMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SolovevaAJMZ19,
  author       = {Faina I. Solov'eva and
                  Daniel Augot and
                  Thomas Johansson and
                  Marine Minier and
                  Victor A. Zinoviev},
  title        = {Editorial: Special issue on coding and cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {183--184},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00601-w},
  doi          = {10.1007/S10623-018-00601-W},
  timestamp    = {Wed, 20 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SolovevaAJMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GuoJ19,
  author       = {Qian Guo and
                  Thomas Johansson},
  title        = {A new birthday-type algorithm for attacking the fresh re-keying countermeasure},
  journal      = {Inf. Process. Lett.},
  volume       = {146},
  pages        = {30--34},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ipl.2019.02.005},
  doi          = {10.1016/J.IPL.2019.02.005},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/GuoJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NilssonJS19,
  author       = {Alexander Nilsson and
                  Thomas Johansson and
                  Paul Stankovski},
  title        = {Error Amplification in Code-based Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {238--258},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.238-258},
  doi          = {10.13154/TCHES.V2019.I1.238-258},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/NilssonJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GuoJW19,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Paul Stankovski Wagner},
  title        = {A Key Recovery Reaction Attack on {QC-MDPC}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {3},
  pages        = {1845--1861},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2018.2877458},
  doi          = {10.1109/TIT.2018.2877458},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GuoJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GuoJMW19,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Erik M{\aa}rtensson and
                  Paul Stankovski Wagner},
  title        = {On the Asymptotics of Solving the {LWE} Problem Using Coded-BKW With
                  Sieving},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {8},
  pages        = {5243--5259},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2019.2906233},
  doi          = {10.1109/TIT.2019.2906233},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GuoJMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Ekdahl0MY19,
  author       = {Patrik Ekdahl and
                  Thomas Johansson and
                  Alexander Maximov and
                  Jing Yang},
  title        = {A new {SNOW} stream cipher called {SNOW-V}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {1--42},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.1-42},
  doi          = {10.13154/TOSC.V2019.I3.1-42},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Ekdahl0MY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/YangJM19,
  author       = {Jing Yang and
                  Thomas Johansson and
                  Alexander Maximov},
  title        = {Vectorized linear approximations for attacks on {SNOW} 3G},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {249--271},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.249-271},
  doi          = {10.13154/TOSC.V2019.I4.249-271},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/YangJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/00010Y19,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Jing Yang},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {A Novel {CCA} Attack Using Decryption Errors Against {LAC}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11921},
  pages        = {82--111},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34578-5\_4},
  doi          = {10.1007/978-3-030-34578-5\_4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/00010Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/Hell0MSY19,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Willi Meier and
                  Jonathan S{\"{o}}nnerup and
                  Hirotaka Yoshida},
  editor       = {Claude Carlet and
                  Sylvain Guilley and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {An {AEAD} Variant of the Grain Stream Cipher},
  booktitle    = {Codes, Cryptology and Information Security - Third International Conference,
                  {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor
                  of Said El Hajji},
  series       = {Lecture Notes in Computer Science},
  volume       = {11445},
  pages        = {55--71},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16458-4\_5},
  doi          = {10.1007/978-3-030-16458-4\_5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/c2si/Hell0MSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BocharovaJK19,
  author       = {Irina E. Bocharova and
                  Thomas Johansson and
                  Boris D. Kudryashov},
  title        = {Improved iterative decoding of {QC-MDPC} codes in the McEliece public
                  key cryptosystem},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2019,
                  Paris, France, July 7-12, 2019},
  pages        = {1882--1886},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISIT.2019.8849839},
  doi          = {10.1109/ISIT.2019.8849839},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/BocharovaJK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DAnversGJNVV19,
  author       = {Jan{-}Pieter D'Anvers and
                  Qian Guo and
                  Thomas Johansson and
                  Alexander Nilsson and
                  Frederik Vercauteren and
                  Ingrid Verbauwhede},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Decryption Failure Attacks on {IND-CCA} Secure Lattice-Based Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {565--598},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_19},
  doi          = {10.1007/978-3-030-17259-6\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DAnversGJNVV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/00010MW19,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Erik M{\aa}rtensson and
                  Paul Stankovski Wagner},
  title        = {On the Asymptotics of Solving the {LWE} Problem Using Coded-BKW with
                  Sieving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/00010MW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/00010N19,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Alexander Nilsson},
  title        = {A Generic Attack on Lattice-based Schemes using Decryption Errors
                  with Application to ss-ntru-pke},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/00010N19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangJM19,
  author       = {Jing Yang and
                  Thomas Johansson and
                  Alexander Maximov},
  title        = {Vectorized linear approximations for attacks on {SNOW} 3G},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {991},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/991},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoJY19,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Jing Yang},
  title        = {A Novel {CCA} Attack using Decryption Errors against {LAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1308},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1308},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoJY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yang0M19,
  author       = {Jing Yang and
                  Thomas Johansson and
                  Alexander Maximov},
  title        = {Spectral analysis of {ZUC-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1352},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1352},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yang0M19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/DeneuvilleGGJ18,
  author       = {Jean{-}Christophe Deneuville and
                  Philippe Gaborit and
                  Qian Guo and
                  Thomas Johansson},
  title        = {Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol},
  booktitle    = {2018 {IEEE} International Symposium on Information Theory, {ISIT}
                  2018, Vail, CO, USA, June 17-22, 2018},
  pages        = {1450--1454},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISIT.2018.8437940},
  doi          = {10.1109/ISIT.2018.8437940},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/DeneuvilleGGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EkdahlJMY18,
  author       = {Patrik Ekdahl and
                  Thomas Johansson and
                  Alexander Maximov and
                  Jing Yang},
  title        = {A new {SNOW} stream cipher called {SNOW-V}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1143},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1143},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EkdahlJMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NilssonJS18,
  author       = {Alexander Nilsson and
                  Thomas Johansson and
                  Paul Stankovski},
  title        = {Error Amplification in Code-based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1223},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NilssonJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CharpinJKST17,
  author       = {Pascale Charpin and
                  Thomas Johansson and
                  Gohar M. Kyureghyan and
                  Nicolas Sendrier and
                  Jean{-}Pierre Tillich},
  title        = {Editorial: Special issue on coding and cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {1-2},
  pages        = {1--2},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0307-3},
  doi          = {10.1007/S10623-016-0307-3},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CharpinJKST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/00010MS17,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Erik M{\aa}rtensson and
                  Paul Stankovski},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Coded-BKW with Sieving},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {323--346},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_12},
  doi          = {10.1007/978-3-319-70694-8\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/00010MS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/00010MS17,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Erik M{\aa}rtensson and
                  Paul Stankovski},
  title        = {Information set decoding with soft information and some cryptographic
                  applications},
  booktitle    = {2017 {IEEE} International Symposium on Information Theory, {ISIT}
                  2017, Aachen, Germany, June 25-30, 2017},
  pages        = {1793--1797},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISIT.2017.8006838},
  doi          = {10.1109/ISIT.2017.8006838},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/00010MS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/FabsicHSZG017,
  author       = {Tom{\'{a}}s Fabsic and
                  Viliam Hromada and
                  Paul Stankovski and
                  Pavol Zajac and
                  Qian Guo and
                  Thomas Johansson},
  editor       = {Tanja Lange and
                  Tsuyoshi Takagi},
  title        = {A Reaction Attack on the {QC-LDPC} McEliece Cryptosystem},
  booktitle    = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
                  Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10346},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59879-6\_4},
  doi          = {10.1007/978-3-319-59879-6\_4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/FabsicHSZG017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FabsicHSZG017,
  author       = {Tom{\'{a}}s Fabsic and
                  Viliam Hromada and
                  Paul Stankovski and
                  Pavol Zajac and
                  Qian Guo and
                  Thomas Johansson},
  title        = {A Reaction Attack on the {QC-LDPC} McEliece Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FabsicHSZG017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Londahl0SAA16,
  author       = {Carl L{\"{o}}ndahl and
                  Thomas Johansson and
                  Masoumeh Koochak Shooshtari and
                  Mahmoud Ahmadian{-}Attari and
                  Mohammad Reza Aref},
  title        = {Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic
                  codes of even dimension},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {359--377},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0099-x},
  doi          = {10.1007/S10623-015-0099-X},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Londahl0SAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ShooshtariAJA16,
  author       = {Masoumeh Koochak Shooshtari and
                  Mahmoud Ahmadian{-}Attari and
                  Thomas Johansson and
                  Mohammad Reza Aref},
  title        = {Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic
                  low-density parity check codes},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {194--202},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0064},
  doi          = {10.1049/IET-IFS.2015.0064},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ShooshtariAJA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Guo0S16,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Paul Stankovski},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {A Key Recovery Attack on {MDPC} with {CCA} Security Using Decoding
                  Errors},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {789--815},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_29},
  doi          = {10.1007/978-3-662-53887-6\_29},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Guo0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Guo016,
  author       = {Qian Guo and
                  Thomas Johansson},
  title        = {A p-ary {MDPC} scheme},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {1356--1360},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541520},
  doi          = {10.1109/ISIT.2016.7541520},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/Guo016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Guo016,
  author       = {Qian Guo and
                  Thomas Johansson},
  title        = {A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Guo016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Guo0S16,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Paul Stankovski},
  title        = {Coded-BKW: Solving {LWE} Using Lattice Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Guo0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Guo0S16a,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Paul Stankovski},
  title        = {A Key Recovery Attack on {MDPC} with {CCA} Security Using Decoding
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {858},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/858},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Guo0S16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangSJ15,
  author       = {Hui Wang and
                  Paul Stankovski and
                  Thomas Johansson},
  title        = {A generalized birthday approach for efficiently finding linear relations
                  in {\(\mathscr{l}\)}-sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {74},
  number       = {1},
  pages        = {41--57},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-013-9845-0},
  doi          = {10.1007/S10623-013-9845-0},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WangSJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GuoJL15,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Carl L{\"{o}}ndahl},
  title        = {A New Algorithm for Solving Ring-LPN With a Reducible Polynomial},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {61},
  number       = {11},
  pages        = {6204--6212},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIT.2015.2475738},
  doi          = {10.1109/TIT.2015.2475738},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GuoJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuoJS15,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Paul Stankovski},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Coded-BKW: Solving {LWE} Using Lattice Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_2},
  doi          = {10.1007/978-3-662-47989-6\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GuoJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LondahlJ14,
  author       = {Carl L{\"{o}}ndahl and
                  Thomas Johansson},
  title        = {Improved algorithms for finding low-weight polynomial multiples in
                  F\({}_{\mbox{2}}\)[x] and some cryptographic applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {625--640},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9960-6},
  doi          = {10.1007/S10623-014-9960-6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LondahlJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/StankovskiHJ14,
  author       = {Paul Stankovski and
                  Martin Hell and
                  Thomas Johansson},
  title        = {An Efficient State Recovery Attack on the {X-FCSR} Family of Stream
                  Ciphers},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {1},
  pages        = {1--22},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-012-9130-9},
  doi          = {10.1007/S00145-012-9130-9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/StankovskiHJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GuoJL14,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Carl L{\"{o}}ndahl},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Solving {LPN} Using Covering Codes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_1},
  doi          = {10.1007/978-3-662-45611-8\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GuoJL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GuoJL14,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Carl L{\"{o}}ndahl},
  title        = {A New Algorithm for Solving Ring-LPN with a Reducible Polynomial},
  journal      = {CoRR},
  volume       = {abs/1409.0472},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.0472},
  eprinttype    = {arXiv},
  eprint       = {1409.0472},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GuoJL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangHJA13,
  author       = {Hui Wang and
                  Martin Hell and
                  Thomas Johansson and
                  Martin {\AA}gren},
  title        = {Improved Key Recovery Attack on the {BEAN} Stream Cipher},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {6},
  pages        = {1437--1444},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.1437},
  doi          = {10.1587/TRANSFUN.E96.A.1437},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangHJA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2013,
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9},
  doi          = {10.1007/978-3-642-38348-9},
  isbn         = {978-3-642-38347-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/AgrenLHJ12,
  author       = {Martin {\AA}gren and
                  Carl L{\"{o}}ndahl and
                  Martin Hell and
                  Thomas Johansson},
  title        = {A survey on fast correlation attacks},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {173--202},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0062-x},
  doi          = {10.1007/S12095-012-0062-X},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/AgrenLHJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/StankovskiRHJ12,
  author       = {Paul Stankovski and
                  Sushmita Ruj and
                  Martin Hell and
                  Thomas Johansson},
  title        = {Improved distinguishers for {HC-128}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {63},
  number       = {2},
  pages        = {225--240},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9550-9},
  doi          = {10.1007/S10623-011-9550-9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/StankovskiRHJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WangJK12,
  author       = {Qichun Wang and
                  Thomas Johansson and
                  Haibin Kan},
  title        = {Some results on fast algebraic attacks and higher-order non-linearities},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {41--46},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0090},
  doi          = {10.1049/IET-IFS.2011.0090},
  timestamp    = {Mon, 25 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WangJK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AgrenHJ12,
  author       = {Martin {\AA}gren and
                  Martin Hell and
                  Thomas Johansson},
  title        = {On hardware-oriented message authentication},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {329--336},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0221},
  doi          = {10.1049/IET-IFS.2011.0221},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AgrenHJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HellJBE12,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Lennart Brynielsson and
                  H{\aa}kan Englund},
  title        = {Improved Distinguishers on Stream Ciphers With Certain Weak Feedback
                  Polynomials},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {9},
  pages        = {6183--6193},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2202212},
  doi          = {10.1109/TIT.2012.2202212},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/HellJBE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/StankovskiHJ12,
  author       = {Paul Stankovski and
                  Martin Hell and
                  Thomas Johansson},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Analysis of Xorrotation with Application to an {HC-128} Variant},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {419--425},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_31},
  doi          = {10.1007/978-3-642-31448-3\_31},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/StankovskiHJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LondahlJ12,
  author       = {Carl L{\"{o}}ndahl and
                  Thomas Johansson},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {A New Version of McEliece {PKC} Based on Convolutional Codes},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {461--470},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_45},
  doi          = {10.1007/978-3-642-34129-8\_45},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LondahlJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istc/AgrenH0L12,
  author       = {Martin {\AA}gren and
                  Martin Hell and
                  Thomas Johansson and
                  Carl L{\"{o}}ndahl},
  title        = {Improved message passing techniques in fast correlation attacks on
                  stream ciphers},
  booktitle    = {7th International Symposium on Turbo Codes and Iterative Information
                  Processing, {ISTC} 2012, August 27-31, 2012, Gothenburg, Sweden},
  pages        = {260--264},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISTC.2012.6325183},
  doi          = {10.1109/ISTC.2012.6325183},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/istc/AgrenH0L12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/MartucciZSHJS12,
  author       = {Leonardo A. Martucci and
                  Albin Zuccato and
                  Ben J. M. Smeets and
                  Sheikh Mahbub Habib and
                  Thomas Johansson and
                  Nahid Shahmehri},
  editor       = {Bernady O. Apduhan and
                  Ching{-}Hsien Hsu and
                  Tadashi Dohi and
                  Kenji Ishida and
                  Laurence Tianruo Yang and
                  Jianhua Ma},
  title        = {Privacy, Security and Trust in Cloud Computing: The Perspective of
                  the Telecommunication Industry},
  booktitle    = {9th International Conference on Ubiquitous Intelligence and Computing
                  and 9th International Conference on Autonomic and Trusted Computing,
                  {UIC/ATC} 2012, Fukuoka, Japan, September 4-7, 2012},
  pages        = {627--632},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/UIC-ATC.2012.166},
  doi          = {10.1109/UIC-ATC.2012.166},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/MartucciZSHJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2012,
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4},
  doi          = {10.1007/978-3-642-29011-4},
  isbn         = {978-3-642-29010-7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/AgrenHJM11,
  author       = {Martin {\AA}gren and
                  Martin Hell and
                  Thomas Johansson and
                  Willi Meier},
  title        = {Grain-128a: a new version of Grain-128 with optional authentication},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {5},
  number       = {1},
  pages        = {48--59},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJWMC.2011.044106},
  doi          = {10.1504/IJWMC.2011.044106},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijwmc/AgrenHJM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HellJ11,
  author       = {Martin Hell and
                  Thomas Johansson},
  title        = {Breaking the Stream Ciphers {F-FCSR-H} and {F-FCSR-16} in Real Time},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {3},
  pages        = {427--445},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-009-9053-2},
  doi          = {10.1007/S00145-009-9053-2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/HellJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AgrenJ11,
  author       = {Martin {\AA}gren and
                  Thomas Johansson},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {114--133},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_10},
  doi          = {10.1007/978-3-642-25578-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AgrenJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrenJ11,
  author       = {Martin {\AA}gren and
                  Thomas Johansson},
  title        = {Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrenJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangJ10,
  author       = {Qichun Wang and
                  Thomas Johansson},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {A Note on Fast Algebraic Attacks and Higher Order Nonlinearities},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {404--414},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_28},
  doi          = {10.1007/978-3-642-21518-6\_28},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/WangJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangJ10,
  author       = {Qichun Wang and
                  Thomas Johansson},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {On Equivalence Classes of Boolean Functions},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {311--324},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_21},
  doi          = {10.1007/978-3-642-24209-0\_21},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/WangJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/HellJB09,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Lennart Brynielsson},
  title        = {An overview of distinguishing attacks on stream ciphers},
  journal      = {Cryptogr. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {71--94},
  year         = {2009},
  url          = {https://doi.org/10.1007/s12095-008-0006-7},
  doi          = {10.1007/S12095-008-0006-7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/HellJB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AgrenJH09,
  author       = {Martin {\AA}gren and
                  Thomas Johansson and
                  Martin Hell},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Improving the Rainbow Attack by Reusing Colours},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {362--378},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_24},
  doi          = {10.1007/978-3-642-10433-6\_24},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/AgrenJH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/StankovskiHJ09,
  author       = {Paul Stankovski and
                  Martin Hell and
                  Thomas Johansson},
  editor       = {Orr Dunkelman},
  title        = {An Efficient State Recovery Attack on {X-FCSR-256}},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {23--37},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_2},
  doi          = {10.1007/978-3-642-03317-9\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/StankovskiHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HellJ08,
  author       = {Martin Hell and
                  Thomas Johansson},
  editor       = {Josef Pieprzyk},
  title        = {Breaking the {F-FCSR-H} Stream Cipher in Real Time},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {557--569},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_34},
  doi          = {10.1007/978-3-540-89255-7\_34},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HellJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/HellJMM08,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Alexander Maximov and
                  Willi Meier},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {The Grain Family of Stream Ciphers},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {179--190},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_14},
  doi          = {10.1007/978-3-540-68351-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/HellJMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HellJ07,
  author       = {Martin Hell and
                  Thomas Johansson},
  title        = {Cryptanalysis of Achterbahn-128/80},
  journal      = {{IET} Inf. Secur.},
  volume       = {1},
  number       = {2},
  pages        = {47--52},
  year         = {2007},
  url          = {https://doi.org/10.1049/iet-ifs:20060153},
  doi          = {10.1049/IET-IFS:20060153},
  timestamp    = {Mon, 25 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HellJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/HellJM07,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Willi Meier},
  title        = {Grain: a stream cipher for constrained environments},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {2},
  number       = {1},
  pages        = {86--93},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJWMC.2007.013798},
  doi          = {10.1504/IJWMC.2007.013798},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijwmc/HellJM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MaximovJ07,
  author       = {Alexander Maximov and
                  Thomas Johansson},
  title        = {A Linear Distinguishing Attack on Scream},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {9},
  pages        = {3127--3144},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2007.903131},
  doi          = {10.1109/TIT.2007.903131},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MaximovJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HellJ07,
  author       = {Martin Hell and
                  Thomas Johansson},
  editor       = {Kaoru Kurosawa},
  title        = {A Key Recovery Attack on Edon80},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {568--581},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_35},
  doi          = {10.1007/978-3-540-76900-2\_35},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HellJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EnglundHJ07,
  author       = {H{\aa}kan Englund and
                  Martin Hell and
                  Thomas Johansson},
  editor       = {Alex Biryukov},
  title        = {Two General Attacks on Pomaranch-Like Keystream Generators},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {274--289},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_18},
  doi          = {10.1007/978-3-540-74619-5\_18},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/EnglundHJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/EnglundJT07,
  author       = {H{\aa}kan Englund and
                  Thomas Johansson and
                  Meltem S{\"{o}}nmez Turan},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {A Framework for Chosen {IV} Statistical Analysis of Stream Ciphers},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {268--281},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_20},
  doi          = {10.1007/978-3-540-77026-8\_20},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/EnglundJT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/EnglundH007,
  author       = {H{\aa}kan Englund and
                  Martin Hell and
                  Thomas Johansson},
  editor       = {Tor Helleseth and
                  P. Vijay Kumar and
                  {\O}yvind Ytrehus},
  title        = {A Note on Distinguishing Attacks},
  booktitle    = {Proceedings of the {IEEE} Information Theory Workshop on Information
                  Theory for Wireless Networks, July 1-6, 2007, Solstrand, Norway},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ITWITWN.2007.4318038},
  doi          = {10.1109/ITWITWN.2007.4318038},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itw/EnglundH007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/EnglundJ06,
  author       = {H{\aa}kan Englund and
                  Thomas Johansson},
  title        = {Three ways to mount distinguishing attacks on irregularly clocked
                  stream ciphers},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {95--102},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010826},
  doi          = {10.1504/IJSN.2006.010826},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/EnglundJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HellJ06,
  author       = {Martin Hell and
                  Thomas Johansson},
  title        = {Two New Attacks on the Self-Shrinking Generator},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {8},
  pages        = {3837--3843},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.878233},
  doi          = {10.1109/TIT.2006.878233},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/HellJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JohanssonMM06,
  author       = {Thomas Johansson and
                  Willi Meier and
                  Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Matthew J. B. Robshaw},
  title        = {Cryptanalysis of Achterbahn},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_1},
  doi          = {10.1007/11799313\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JohanssonMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Hell0MM06,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Alexander Maximov and
                  Willi Meier},
  title        = {A Stream Cipher Proposal: Grain-128},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {1614--1618},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.261549},
  doi          = {10.1109/ISIT.2006.261549},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/Hell0MM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HellJ06,
  author       = {Martin Hell and
                  Thomas Johansson},
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Cryptanalysis of Achterbahn-Version 2},
  booktitle    = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  pages        = {45--55},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74462-7\_4},
  doi          = {10.1007/978-3-540-74462-7\_4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HellJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HellJ06a,
  author       = {Martin Hell and
                  Thomas Johansson},
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {On the Problem of Finding Linear Approximations and Cryptanalysis
                  of Pomaranch Version 2},
  booktitle    = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  pages        = {220--233},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74462-7\_16},
  doi          = {10.1007/978-3-540-74462-7\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HellJ06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MaximovJ05,
  author       = {Alexander Maximov and
                  Thomas Johansson},
  editor       = {Bimal K. Roy},
  title        = {Fast Computation of Large Distributions and Its Cryptographic Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {313--332},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_17},
  doi          = {10.1007/11593447\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MaximovJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/FangJS05,
  author       = {Wenhai Fang and
                  Thomas Johansson and
                  Lambert Spaanenburg},
  editor       = {Tero Rissa and
                  Steven J. E. Wilton and
                  Philip Heng Wai Leong},
  title        = {Snow 2.0 {IP} Core for Trusted Hardware},
  booktitle    = {Proceedings of the 2005 International Conference on Field Programmable
                  Logic and Applications (FPL), Tampere, Finland, August 24-26, 2005},
  pages        = {281--286},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/FPL.2005.1515735},
  doi          = {10.1109/FPL.2005.1515735},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/FangJS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EnglundJ05,
  author       = {H{\aa}kan Englund and
                  Thomas Johansson},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A New Distinguisher for Clock Controlled Stream Ciphers},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_12},
  doi          = {10.1007/11502760\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/EnglundJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HellJ05,
  author       = {Martin Hell and
                  Thomas Johansson},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Some Attacks on the Bit-Search Generator},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {215--227},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_14},
  doi          = {10.1007/11502760\_14},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/HellJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/TrofimovJ04,
  author       = {A. Trofimov and
                  Thomas Johansson},
  title        = {A memory-efficient optimal {APP} symbol-decoding algorithm for linear
                  block codes},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {52},
  number       = {9},
  pages        = {1429--1434},
  year         = {2004},
  url          = {https://doi.org/10.1109/TCOMM.2004.833067},
  doi          = {10.1109/TCOMM.2004.833067},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcom/TrofimovJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EnglundHJ04,
  author       = {H{\aa}kan Englund and
                  Martin Hell and
                  Thomas Johansson},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Correlation Attacks Using a New Class of Weak Feedback Polynomials},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_9},
  doi          = {10.1007/978-3-540-25937-4\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/EnglundHJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MaximovJB04,
  author       = {Alexander Maximov and
                  Thomas Johansson and
                  Steve Babbage},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {An Improved Correlation Attack on {A5/1}},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_1},
  doi          = {10.1007/978-3-540-30564-4\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MaximovJB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/EnglundJ04,
  author       = {H{\aa}kan Englund and
                  Thomas Johansson},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {A New Simple Technique to Attack Filter Generators and Related Ciphers},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {39--53},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_3},
  doi          = {10.1007/978-3-540-30564-4\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/EnglundJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/EkdahlJ03,
  author       = {Patrik Ekdahl and
                  Thomas Johansson},
  title        = {Another attack on {A5/1}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {49},
  number       = {1},
  pages        = {284--289},
  year         = {2003},
  url          = {https://doi.org/10.1109/TIT.2002.806129},
  doi          = {10.1109/TIT.2002.806129},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/EkdahlJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JohanssonP03,
  author       = {Thomas Johansson and
                  Enes Pasalic},
  title        = {A construction of resilient functions with high nonlinearity},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {49},
  number       = {2},
  pages        = {494--501},
  year         = {2003},
  url          = {https://doi.org/10.1109/TIT.2002.807297},
  doi          = {10.1109/TIT.2002.807297},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/JohanssonP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/EkdahlMJ03,
  author       = {Patrik Ekdahl and
                  Willi Meier and
                  Thomas Johansson},
  editor       = {Eli Biham},
  title        = {Predicting the Shrinking Generator with Fixed Connections},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {330--344},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_20},
  doi          = {10.1007/3-540-39200-9\_20},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/EkdahlMJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Johansson03,
  author       = {Thomas Johansson},
  editor       = {Kenneth G. Paterson},
  title        = {Analysis and Design of Modern Stream Ciphers: (Invited Paper) p},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {66},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_6},
  doi          = {10.1007/978-3-540-40974-8\_6},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Johansson03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2003,
  editor       = {Thomas Johansson},
  title        = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b93938},
  doi          = {10.1007/B93938},
  isbn         = {3-540-20449-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2003,
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b94593},
  doi          = {10.1007/B94593},
  isbn         = {3-540-20609-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/JonssonJ02,
  author       = {Fredrik J{\"{o}}nsson and
                  Thomas Johansson},
  title        = {A fast correlation attack on {LILI-128}},
  journal      = {Inf. Process. Lett.},
  volume       = {81},
  number       = {3},
  pages        = {127--132},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0020-0190(01)00208-3},
  doi          = {10.1016/S0020-0190(01)00208-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/JonssonJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/poit/Ourivski002,
  author       = {Alexei V. Ourivski and
                  Thomas Johansson},
  title        = {New Technique for Decoding Codes in the Rank Metric and Its Cryptography
                  Applications},
  journal      = {Probl. Inf. Transm.},
  volume       = {38},
  number       = {3},
  pages        = {237--246},
  year         = {2002},
  url          = {https://doi.org/10.1023/A\%3A1020369320078},
  doi          = {10.1023/A\%3A1020369320078},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/poit/Ourivski002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JohanssonJ02,
  author       = {Thomas Johansson and
                  Fredrik J{\"{o}}nsson},
  title        = {Theoretical analysis of a correlation attack based on convolutional
                  codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {48},
  number       = {8},
  pages        = {2173--2181},
  year         = {2002},
  url          = {https://doi.org/10.1109/TIT.2002.800494},
  doi          = {10.1109/TIT.2002.800494},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/JohanssonJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JohanssonJ02a,
  author       = {Thomas Johansson and
                  Fredrik J{\"{o}}nsson},
  title        = {On the complexity of some cryptographic problems based on the general
                  decoding problem},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {48},
  number       = {10},
  pages        = {2669--2678},
  year         = {2002},
  url          = {https://doi.org/10.1109/TIT.2002.802608},
  doi          = {10.1109/TIT.2002.802608},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/JohanssonJ02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EkdahlJ02,
  author       = {Patrik Ekdahl and
                  Thomas Johansson},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Distinguishing Attacks on SOBER-t16 and t32},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {210--224},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_16},
  doi          = {10.1007/3-540-45661-9\_16},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/EkdahlJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MaityJ02,
  author       = {Soumen Maity and
                  Thomas Johansson},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Construction of Cryptographically Important Boolean Functions},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {234--245},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_19},
  doi          = {10.1007/3-540-36231-2\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MaityJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/EkdahlJ02,
  author       = {Patrik Ekdahl and
                  Thomas Johansson},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {A New Version of the Stream Cipher {SNOW}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {47--61},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_5},
  doi          = {10.1007/3-540-36492-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/EkdahlJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/PasalicMJS01,
  author       = {Emir Pasalic and
                  Subhamoy Maitra and
                  Thomas Johansson and
                  Palash Sarkar},
  title        = {New Constructions of Resilient and Correlation Immune Boolean Functions
                  Achieving Upper Bound on Nonlinearity},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {6},
  pages        = {158--167},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0653(04)00167-2},
  doi          = {10.1016/S1571-0653(04)00167-2},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/endm/PasalicMJS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KurosawaJS01,
  author       = {Kaoru Kurosawa and
                  Thomas Johansson and
                  Douglas R. Stinson},
  title        = {Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {4},
  pages        = {231--253},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0010-y},
  doi          = {10.1007/S00145-001-0010-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KurosawaJS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JohanssonJ00,
  author       = {Thomas Johansson and
                  Fredrik J{\"{o}}nsson},
  editor       = {Mihir Bellare},
  title        = {Fast Correlation Attacks through Reconstruction of Linear Polynomials},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {300--315},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_19},
  doi          = {10.1007/3-540-44598-6\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/JohanssonJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChepyzhovJS00,
  author       = {Vladimir V. Chepyzhov and
                  Thomas Johansson and
                  Ben J. M. Smeets},
  editor       = {Bruce Schneier},
  title        = {A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_13},
  doi          = {10.1007/3-540-44706-7\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/ChepyzhovJS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PasalicJMS00,
  author       = {Enes Pasalic and
                  Thomas Johansson and
                  Subhamoy Maitra and
                  Palash Sarkar},
  title        = {New Constructions of Resilent and Correlation Immune Boolean Functions
                  achieving Upper Bounds on Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PasalicJMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JohanssonP00,
  author       = {Thomas Johansson and
                  Enes Pasalic},
  title        = {A Construction of Resilient Functions with High Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JohanssonP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Johansson99,
  author       = {Thomas Johansson},
  title        = {Further Results on Asymmetric Authentication Schemes},
  journal      = {Inf. Comput.},
  volume       = {151},
  number       = {1-2},
  pages        = {100--133},
  year         = {1999},
  url          = {https://doi.org/10.1006/inco.1998.2767},
  doi          = {10.1006/INCO.1998.2767},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Johansson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JohanssonJ99,
  author       = {Thomas Johansson and
                  Fredrik J{\"{o}}nsson},
  editor       = {Michael J. Wiener},
  title        = {Fast Correlation Attacks Based on Turbo Code Techniques},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_12},
  doi          = {10.1007/3-540-48405-1\_12},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/JohanssonJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JohanssonJ99,
  author       = {Thomas Johansson and
                  Fredrik J{\"{o}}nsson},
  editor       = {Jacques Stern},
  title        = {Improved Fast Correlation Attacks on Stream Ciphers via Convolutional
                  Codes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {347--362},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_24},
  doi          = {10.1007/3-540-48910-X\_24},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JohanssonJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/PasalicJ99,
  author       = {Enes Pasalic and
                  Thomas Johansson},
  editor       = {Michael Walker},
  title        = {Further Results on the Relation Between Nonlinearity and Resiliency
                  for Boolean Functions},
  booktitle    = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
                  UK, December 20-22, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1746},
  pages        = {35--44},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46665-7\_3},
  doi          = {10.1007/3-540-46665-7\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/PasalicJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JohanssonZ98,
  author       = {Thomas Johansson and
                  Kamil Sh. Zigangirov},
  title        = {A Simple One-Sweep Algorithm for Optimal {APP} Symbol Decoding of
                  Linear Block Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {44},
  number       = {7},
  pages        = {3124--3129},
  year         = {1998},
  url          = {https://doi.org/10.1109/18.737541},
  doi          = {10.1109/18.737541},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/JohanssonZ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Johansson98,
  author       = {Thomas Johansson},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {342--356},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_27},
  doi          = {10.1007/3-540-49649-1\_27},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Johansson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Johansson97,
  author       = {Thomas Johansson},
  editor       = {Walter Fumy},
  title        = {Bucket Hashing with a Small Key Size},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {149--162},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_12},
  doi          = {10.1007/3-540-69053-0\_12},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Johansson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaJS97,
  author       = {Kaoru Kurosawa and
                  Thomas Johansson and
                  Douglas R. Stinson},
  editor       = {Walter Fumy},
  title        = {Almost k-wise Independent Sample Spaces and Their Cryptologic Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {409--421},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_28},
  doi          = {10.1007/3-540-69053-0\_28},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaJS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KabatianskiiSJ96,
  author       = {Gregory Kabatianskii and
                  Ben J. M. Smeets and
                  Thomas Johansson},
  title        = {On the cardinality of systematic authentication codes via error-correcting
                  codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {42},
  number       = {2},
  pages        = {566--578},
  year         = {1996},
  url          = {https://doi.org/10.1109/18.485725},
  doi          = {10.1109/18.485725},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KabatianskiiSJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HellesethJ96,
  author       = {Tor Helleseth and
                  Thomas Johansson},
  editor       = {Neal Koblitz},
  title        = {Universal Hash Functions from Exponential Sums over Finite Fields
                  and Galois Rings},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {31--44},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_3},
  doi          = {10.1007/3-540-68697-5\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/HellesethJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Johansson95,
  author       = {Thomas Johansson},
  title        = {Authentication Codes for Nontrusting Parties Obtained from Rank Metric
                  Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {205--218},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01388475},
  doi          = {10.1007/BF01388475},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Johansson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Johansson94,
  author       = {Thomas Johansson},
  title        = {A Shift Register Construction of Unconditionally Secure Authentication
                  Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {69--81},
  year         = {1994},
  url          = {https://doi.org/10.1007/BF01388561},
  doi          = {10.1007/BF01388561},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Johansson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Johansson94,
  author       = {Thomas Johansson},
  title        = {Lower bounds on the probability of deception in authentication with
                  arbitration},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {40},
  number       = {5},
  pages        = {1573--1585},
  year         = {1994},
  url          = {https://doi.org/10.1109/18.333869},
  doi          = {10.1109/18.333869},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Johansson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JohanssonS94,
  author       = {Thomas Johansson and
                  Ben J. M. Smeets},
  editor       = {Alfredo De Santis},
  title        = {On A{\({^2}\)}-Codes Including Arbiter's Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {456--460},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053463},
  doi          = {10.1007/BFB0053463},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JohanssonS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/JohanssonB94,
  author       = {Thomas Johansson and
                  Ewert Bengtsson},
  title        = {Parallel algorithms on compact binary objects},
  booktitle    = {12th {IAPR} International Conference on Pattern Recognition, Conference
                  {C:} Signal Processing / Conference {D:} Parallel Computing, {ICPR}
                  1994, Jerusalem, Israel, 9-13 October, 1994, Volume 3},
  pages        = {370--372},
  publisher    = {{IEEE}},
  year         = {1994},
  url          = {https://doi.org/10.1109/ICPR.1994.577206},
  doi          = {10.1109/ICPR.1994.577206},
  timestamp    = {Thu, 28 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpr/JohanssonB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/parle/JohanssonB94,
  author       = {Thomas Johansson and
                  Ewert Bengtsson},
  editor       = {Constantine Halatsis and
                  Dimitris G. Maritsas and
                  George Philokyprou and
                  Sergios Theodoridis},
  title        = {A New Parallel {MIMD} Connected Component Labeling Algorithm},
  booktitle    = {{PARLE} '94: Parallel Architectures and Languages Europe, 6th International
                  {PARLE} Conference, Athens, Greece, July 4-8, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {817},
  pages        = {801--804},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58184-7\_161},
  doi          = {10.1007/3-540-58184-7\_161},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/parle/JohanssonB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BierbrauerJKS93,
  author       = {J{\"{u}}rgen Bierbrauer and
                  Thomas Johansson and
                  Gregory Kabatianskii and
                  Ben J. M. Smeets},
  editor       = {Douglas R. Stinson},
  title        = {On Families of Hash Functions via Geometric Codes and Concatenation},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {331--342},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_28},
  doi          = {10.1007/3-540-48329-2\_28},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BierbrauerJKS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Johansson93,
  author       = {Thomas Johansson},
  editor       = {Douglas R. Stinson},
  title        = {On the Construction of Perfect Authentication Codes that Permit Arbitration},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {343--354},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_29},
  doi          = {10.1007/3-540-48329-2\_29},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Johansson93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JohanssonKS93,
  author       = {Thomas Johansson and
                  Gregory Kabatianskii and
                  Ben J. M. Smeets},
  editor       = {Tor Helleseth},
  title        = {On the Relation between A-Codes and Codes Correcting Independent Errors},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_1},
  doi          = {10.1007/3-540-48285-7\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JohanssonKS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}