BibTeX records: Mats Näslund

download as .bib file

@article{DBLP:journals/iacr/MaximovN23,
  author       = {Alexander Maximov and
                  Mats N{\"{a}}slund},
  title        = {Security analysis of the Milenage-construction based on a {PRF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/607},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaximovN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ArfaouiBBBEFKNN18,
  author       = {Ghada Arfaoui and
                  Pascal Bisson and
                  Rolf Blom and
                  Ravishankar Borgaonkar and
                  H{\aa}kan Englund and
                  Edith Felix and
                  Felix Klaedtke and
                  Prajwol Kumar Nakarmi and
                  Mats N{\"{a}}slund and
                  Piers O'Hanlon and
                  Juri Papay and
                  Jani Suomalainen and
                  Mike Surridge and
                  Jean{-}Philippe Wary and
                  Alexander Zahariev},
  title        = {A Security Architecture for 5G Networks},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {22466--22479},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2827419},
  doi          = {10.1109/ACCESS.2018.2827419},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ArfaouiBBBEFKNN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/DubrovaNSL18,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander and
                  Fredrik Lindqvist},
  title        = {Message Authentication Based on Cryptographically Secure {CRC} without
                  Polynomial Irreducibility Test},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {2},
  pages        = {383--399},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0227-8},
  doi          = {10.1007/S12095-017-0227-8},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/DubrovaNSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/norchip/YuDNT18,
  author       = {Yang Yu and
                  Elena Dubrova and
                  Mats N{\"{a}}slund and
                  Sha Tao},
  editor       = {Jari Nurmi and
                  Peeter Ellervee and
                  Juri Mihhailov and
                  Maksim Jenihhin and
                  Kalle Tammem{\"{a}}e},
  title        = {On Designing PUF-Based TRNGs with Known Answer Tests},
  booktitle    = {2018 {IEEE} Nordic Circuits and Systems Conference, {NORCAS} 2018:
                  {NORCHIP} and International Symposium of System-on-Chip (SoC), Tallinn,
                  Estonia, October 30-31, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NORCHIP.2018.8573460},
  doi          = {10.1109/NORCHIP.2018.8573460},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/norchip/YuDNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/norchip/YuDNT18a,
  author       = {Yang Yu and
                  Elena Dubrova and
                  Mats N{\"{a}}slund and
                  Sha Tao},
  editor       = {Jari Nurmi and
                  Peeter Ellervee and
                  Juri Mihhailov and
                  Maksim Jenihhin and
                  Kalle Tammem{\"{a}}e},
  title        = {On Designing PUF-Based TRNGs with Known Answer Tests},
  booktitle    = {2018 {IEEE} Nordic Circuits and Systems Conference, {NORCAS} 2018:
                  {NORCHIP} and International Symposium of System-on-Chip (SoC), Tallinn,
                  Estonia, October 30-31, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NORCHIP.2018.8573489},
  doi          = {10.1109/NORCHIP.2018.8573489},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/norchip/YuDNT18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DubrovaNSL18,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander and
                  Fredrik Lindqvist},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Lightweight Message Authentication for Constrained Devices},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {196--201},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212482},
  doi          = {10.1145/3212480.3212482},
  timestamp    = {Mon, 16 Sep 2019 13:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DubrovaNSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/DubrovaNCFS17,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  Gunnar Carlsson and
                  John Fornehed and
                  Ben J. M. Smeets},
  title        = {Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing
                  Probability of {BIST}},
  journal      = {J. Signal Process. Syst.},
  volume       = {87},
  number       = {3},
  pages        = {371--381},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11265-016-1127-4},
  doi          = {10.1007/S11265-016-1127-4},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vlsisp/DubrovaNCFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mownet/JimenezNNN17,
  author       = {Enrique Cobo Jimenez and
                  Prajwol Kumar Nakarmi and
                  Mats N{\"{a}}slund and
                  Karl Norrman},
  title        = {Subscription identifier privacy in 5G systems},
  booktitle    = {International Conference on Selected Topics in Mobile and Wireless
                  Networking, MoWNeT 2017, Avignon, France, May 17-19, 2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/MoWNet.2017.8045947},
  doi          = {10.1109/MOWNET.2017.8045947},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mownet/JimenezNNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/BaumannNGST16,
  author       = {Christoph Baumann and
                  Mats N{\"{a}}slund and
                  Christian Gehrmann and
                  Oliver Schwarz and
                  Hans Thorsen},
  title        = {A high assurance virtualization platform for ARMv8},
  booktitle    = {European Conference on Networks and Communications, EuCNC 2016, Athens,
                  Greece, June 27-30, 2016},
  pages        = {210--214},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuCNC.2016.7561034},
  doi          = {10.1109/EUCNC.2016.7561034},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/BaumannNGST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobimedia/DubrovaNSN16,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander and
                  Karl Norrman},
  editor       = {Zheng Yan and
                  Honggang Wang},
  title        = {Error-Correcting Message Authentication for 5G},
  booktitle    = {Proceedings of the 9th {EAI} International Conference on Mobile Multimedia
                  Communications, MobiMedia 2016, Xi'an, China, June 18-20, 2016},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=3021414},
  timestamp    = {Thu, 19 Oct 2017 12:55:22 +0200},
  biburl       = {https://dblp.org/rec/conf/mobimedia/DubrovaNSN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobimedia/NorrmanND16,
  author       = {Karl Norrman and
                  Mats N{\"{a}}slund and
                  Elena Dubrova},
  editor       = {Zheng Yan and
                  Honggang Wang},
  title        = {Protecting {IMSI} and User Privacy in 5G Networks},
  booktitle    = {Proceedings of the 9th {EAI} International Conference on Mobile Multimedia
                  Communications, MobiMedia 2016, Xi'an, China, June 18-20, 2016},
  pages        = {159--166},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=3021415},
  timestamp    = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobimedia/NorrmanND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/SimplicioIBCN15,
  author       = {Marcos A. Simpl{\'{\i}}cio Jr. and
                  Leonardo H. Iwaya and
                  Bruno M. Barros and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund},
  title        = {SecourHealth: {A} Delay-Tolerant Security Framework for Mobile Health
                  Data Collection},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {19},
  number       = {2},
  pages        = {761--772},
  year         = {2015},
  url          = {https://doi.org/10.1109/JBHI.2014.2320444},
  doi          = {10.1109/JBHI.2014.2320444},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/titb/SimplicioIBCN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/BarrosISCMN15,
  author       = {Bruno M. Barros and
                  Leonardo H. Iwaya and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Tereza Cristina M. B. Carvalho and
                  Andr{\'{a}}s M{\'{e}}hes and
                  Mats N{\"{a}}slund},
  editor       = {Markus Helfert and
                  Donald Ferguson and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz},
  title        = {Classifying Security Threats in Cloud Networking},
  booktitle    = {{CLOSER} 2015 - Proceedings of the 5th International Conference on
                  Cloud Computing and Services Science, Lisbon, Portugal, 20-22 May,
                  2015},
  pages        = {214--220},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005489402140220},
  doi          = {10.5220/0005489402140220},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/BarrosISCMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/NaslundDSL15,
  author       = {Mats N{\"{a}}slund and
                  Elena Dubrova and
                  G{\"{o}}ran Selander and
                  Fredrik Lindqvist},
  title        = {A random access procedure based on tunable puzzles},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {533--540},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346866},
  doi          = {10.1109/CNS.2015.7346866},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/NaslundDSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DubrovaNS15,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander},
  title        = {CRC-Based Message Authentication for 5G Mobile Technology},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1186--1191},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.503},
  doi          = {10.1109/TRUSTCOM.2015.503},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DubrovaNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ArkkoNNS15,
  author       = {Jari Arkko and
                  Karl Norrman and
                  Mats N{\"{a}}slund and
                  Bengt Sahlin},
  title        = {A {USIM} Compatible 5G {AKA} Protocol with Perfect Forward Secrecy},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1205--1209},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.506},
  doi          = {10.1109/TRUSTCOM.2015.506},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ArkkoNNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DubrovaNCFS15,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  Gunnar Carlsson and
                  John Fornehed and
                  Ben J. M. Smeets},
  title        = {Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing
                  Probability of {BIST}},
  journal      = {CoRR},
  volume       = {abs/1511.07792},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.07792},
  eprinttype    = {arXiv},
  eprint       = {1511.07792},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DubrovaNCFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DubrovaNSL15,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander and
                  Fredrik Lindqvist},
  title        = {Cryptographically Secure {CRC} for Lightweight Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DubrovaNSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DubrovaNCFS15,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  Gunnar Carlsson and
                  John Fornehed and
                  Ben J. M. Smeets},
  title        = {Remotely Managed Logic Built-In Self-Test for Secure {M2M} Communications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DubrovaNCFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DubrovaNSL15a,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander and
                  Fredrik Lindqvist},
  title        = {Lightweight CRC-based Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1138},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DubrovaNSL15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ets/DubrovaNS14,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander},
  editor       = {Giorgio Di Natale},
  title        = {Secure and efficient {LBIST} for feedback shift register-based cryptographic
                  systems},
  booktitle    = {19th {IEEE} European Test Symposium, {ETS} 2014, Paderborn, Germany,
                  May 26-30, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ETS.2014.6847821},
  doi          = {10.1109/ETS.2014.6847821},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/DubrovaNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issoc/DubrovaNCS14,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  Gunnar Carlsson and
                  Ben J. M. Smeets},
  editor       = {Jari Nurmi and
                  Peeter Ellervee and
                  Dragomir Milojevic and
                  Ondrej Daniel and
                  Tommi Paakki},
  title        = {Keyed logic {BIST} for Trojan detection in SoC},
  booktitle    = {2014 International Symposium on System-on-Chip, SoC 2014, Tampere,
                  Finland, October 28-29, 2014},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSOC.2014.6972433},
  doi          = {10.1109/ISSOC.2014.6972433},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/issoc/DubrovaNCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/norchip/DubrovaNST14,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander and
                  Vlasios Tsiatsis},
  title        = {Energy-efficient message authentication for {IEEE} 802.15.4-based
                  wireless sensor networks},
  booktitle    = {2014 NORCHIP, Tampere, Finland, October 27-28, 2014},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NORCHIP.2014.7004700},
  doi          = {10.1109/NORCHIP.2014.7004700},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/norchip/DubrovaNST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/SimplicioOMBCN13,
  author       = {Marcos A. Simpl{\'{\i}}cio Jr. and
                  Bruno Trevizan de Oliveira and
                  C{\'{\i}}ntia B. Margi and
                  Paulo S. L. M. Barreto and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund},
  title        = {Survey and comparison of message authentication solutions on wireless
                  sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {11},
  number       = {3},
  pages        = {1221--1236},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.adhoc.2012.08.011},
  doi          = {10.1016/J.ADHOC.2012.08.011},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/SimplicioOMBCN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/IwayaGSCDSRGNH13,
  author       = {Leonardo H. Iwaya and
                  Marco A. L. Gomes and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Tereza Cristina Melo de Brito Carvalho and
                  Cristina K. Dominicini and
                  Rony R. M. Sakuragui and
                  Marina S. Rebelo and
                  Marco A. Gutierrez and
                  Mats N{\"{a}}slund and
                  P. H{\aa}kansson},
  title        = {Mobile health in emerging countries: {A} survey of research initiatives
                  in Brazil},
  journal      = {Int. J. Medical Informatics},
  volume       = {82},
  number       = {5},
  pages        = {283--298},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijmedinf.2013.01.003},
  doi          = {10.1016/J.IJMEDINF.2013.01.003},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmi/IwayaGSCDSRGNH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GonzalezRSRCMNA13,
  author       = {Nelson Mimura Gonzalez and
                  Marco Antonio Torrez Rojas and
                  Marcos Vinicius Maciel da Silva and
                  Fernando F. Red{\'{\i}}golo and
                  Tereza Cristina Melo de Brito Carvalho and
                  Charles Christian Miers and
                  Mats N{\"{a}}slund and
                  Abu Shohel Ahmed},
  title        = {A Framework for Authentication and Authorization Credentials in Cloud
                  Computing},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {509--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.63},
  doi          = {10.1109/TRUSTCOM.2013.63},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GonzalezRSRCMNA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/GonzalezMRSCNP12,
  author       = {Nelson M. Gonzalez and
                  Charles Miers and
                  Fernando F. Red{\'{\i}}golo and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  title        = {A quantitative analysis of current security concerns and solutions
                  for cloud computing},
  journal      = {J. Cloud Comput.},
  volume       = {1},
  pages        = {11},
  year         = {2012},
  url          = {https://doi.org/10.1186/2192-113X-1-11},
  doi          = {10.1186/2192-113X-1-11},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/GonzalezMRSCNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccoms/ChengNSF12,
  author       = {Yi Cheng and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander and
                  Eva Fogelstrom},
  title        = {Privacy in machine-to-machine communications {A} state-of-the-art
                  survey},
  booktitle    = {{IEEE} International Conference on Communication Systems, {ICCS} 2012,
                  Singapore, November 21-23, 2012},
  pages        = {75--79},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICCS.2012.6406112},
  doi          = {10.1109/ICCS.2012.6406112},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccoms/ChengNSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/GonzalezMRSCNP11,
  author       = {Nelson M. Gonzalez and
                  Charles Miers and
                  Fernando F. Red{\'{\i}}golo and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  editor       = {Frank Leymann and
                  Ivan I. Ivanov and
                  Marten van Sinderen and
                  Boris Shishkov},
  title        = {A Taxonomy Model for Cloud Computing Services},
  booktitle    = {{CLOSER} 2011 - Proceedings of the 1st International Conference on
                  Cloud Computing and Services Science, Noordwijkerhout, Netherlands,
                  7-9 May, 2011},
  pages        = {56--65},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Mon, 26 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/GonzalezMRSCNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/GonzalezMRCSNP11,
  author       = {Nelson M. Gonzalez and
                  Charles Miers and
                  Fernando F. Red{\'{\i}}golo and
                  Tereza Cristina M. B. Carvalho and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  editor       = {Costas Lambrinoudakis and
                  Panagiotis Rizomiliotis and
                  Tomasz Wiktor Wlodarczyk},
  title        = {A Quantitative Analysis of Current Security Concerns and Solutions
                  for Cloud Computing},
  booktitle    = {{IEEE} 3rd International Conference on Cloud Computing Technology
                  and Science, CloudCom 2011, Athens, Greece, November 29 - December
                  1, 2011},
  pages        = {231--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CloudCom.2011.39},
  doi          = {10.1109/CLOUDCOM.2011.39},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/GonzalezMRCSNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/SimplicioOBMCN11,
  author       = {Marcos A. Simpl{\'{\i}}cio Jr. and
                  Bruno Trevizan de Oliveira and
                  Paulo S. L. M. Barreto and
                  C{\'{\i}}ntia B. Margi and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund},
  editor       = {Chun Tung Chou and
                  Tom Pfeifer and
                  Anura P. Jayasumana},
  title        = {Comparison of Authenticated-Encryption schemes in Wireless Sensor
                  Networks},
  booktitle    = {{IEEE} 36th Conference on Local Computer Networks, {LCN} 2011, Bonn,
                  Germany, October 4-7, 2011},
  pages        = {450--457},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/LCN.2011.6115506},
  doi          = {10.1109/LCN.2011.6115506},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/SimplicioOBMCN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/MargiOSSBCNG10,
  author       = {C{\'{\i}}ntia B. Margi and
                  Bruno Trevizan de Oliveira and
                  Gustavo T. de Sousa and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Paulo S. L. M. Barreto and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund and
                  Richard Gold},
  title        = {Impact of Operating Systems on Wireless Sensor Networks (Security)
                  Applications and Testbeds},
  booktitle    = {Proceedings of the 19th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2010, Z{\"{u}}rich, Switzerland,
                  August 2-5, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICCCN.2010.5560028},
  doi          = {10.1109/ICCCN.2010.5560028},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/MargiOSSBCNG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SimplicioCVCNP09,
  author       = {Marcos A. Simpl{\'{\i}}cio Jr. and
                  Vlad Coroama and
                  Yeda Regina Venturini and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  editor       = {Irfan Awan and
                  Muhammad Younas and
                  Takahiro Hara and
                  Arjan Durresi},
  title        = {{PHD}},
  booktitle    = {The {IEEE} 23rd International Conference on Advanced Information Networking
                  and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29,
                  2009},
  pages        = {487--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/AINA.2009.18},
  doi          = {10.1109/AINA.2009.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SimplicioCVCNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HastadN08,
  author       = {Johan H{\aa}stad and
                  Mats N{\"{a}}slund},
  title        = {Practical Construction and Analysis of Pseudo-Randomness Primitives},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {1},
  pages        = {1--26},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-007-9009-3},
  doi          = {10.1007/S00145-007-9009-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HastadN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SimplicioBCMN08,
  author       = {Marcos A. Simpl{\'{\i}}cio Jr. and
                  Paulo S. L. M. Barreto and
                  Tereza Cristina M. B. Carvalho and
                  C{\'{\i}}ntia B. Margi and
                  Mats N{\"{a}}slund},
  editor       = {Claudio Bettini and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Xiaoyang Sean Wang},
  title        = {The {CURUPIRA-2} Block Cipher for Constrained Platforms: Specification
                  and Benchmarking},
  booktitle    = {Proceedings of the 1st International Workshop on Privacy in Location-Based
                  Applications, Malaga, Spain, October 9, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {397},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-397/paper8.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:59 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SimplicioBCMN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medhocnet/VenturiniCCNP08,
  author       = {Yeda Regina Venturini and
                  Vlad Coroama and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  editor       = {Pedro Cuenca and
                  Carlos Guerrero and
                  Ram{\'{o}}n Puigjaner and
                  Bartomeu Serra},
  title        = {Security for Context-Aware ad-hoc Networking Applications},
  booktitle    = {Advances in Ad Hoc Networking - Proceedings of the Seventh Annual
                  Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain,
                  June 25-27, 2008},
  series       = {{IFIP}},
  volume       = {265},
  pages        = {145--156},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09490-8\_13},
  doi          = {10.1007/978-0-387-09490-8\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/medhocnet/VenturiniCCNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4771,
  author       = {Vesa Lehtovirta and
                  Mats N{\"{a}}slund and
                  Karl Norrman},
  title        = {Integrity Transform Carrying Roll-Over Counter for the Secure Real-time
                  Transport Protocol {(SRTP)}},
  journal      = {{RFC}},
  volume       = {4771},
  pages        = {1--12},
  year         = {2007},
  url          = {https://doi.org/10.17487/RFC4771},
  doi          = {10.17487/RFC4771},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4771.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/MatushimaVSCRNP06,
  author       = {Reinaldo Matushima and
                  Yeda Regina Venturini and
                  Rony R. M. Sakuragui and
                  Tereza Cristina M. B. Carvalho and
                  Wilson Vicente Ruggiero and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  editor       = {Seizo Onoe and
                  Mohsen Guizani and
                  Hsiao{-}Hwa Chen and
                  Mamoru Sawahashi},
  title        = {Multiple personal security domains},
  booktitle    = {Proceedings of the International Conference on Wireless Communications
                  and Mobile Computing, {IWCMC} 2006, Vancouver, British Columbia, Canada,
                  July 3-6, 2006},
  pages        = {361--366},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1143549.1143621},
  doi          = {10.1145/1143549.1143621},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwcmc/MatushimaVSCRNP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4567,
  author       = {Jari Arkko and
                  Fredrik Lindholm and
                  Mats N{\"{a}}slund and
                  Karl Norrman and
                  Elisabetta Carrara},
  title        = {Key Management Extensions for Session Description Protocol {(SDP)}
                  and Real Time Streaming Protocol {(RTSP)}},
  journal      = {{RFC}},
  volume       = {4567},
  pages        = {1--30},
  year         = {2006},
  url          = {https://doi.org/10.17487/RFC4567},
  doi          = {10.17487/RFC4567},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4567.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ArkkoNN05,
  author       = {Jari Arkko and
                  Pekka Nikander and
                  Mats N{\"{a}}slund},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Enhancing Privacy with Shared Pseudo Random Sequences},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {187--196},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_22},
  doi          = {10.1007/978-3-540-77156-2\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ArkkoNN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4169,
  author       = {Vesa Torvinen and
                  Jari Arkko and
                  Mats N{\"{a}}slund},
  title        = {Hypertext Transfer Protocol {(HTTP)} Digest Authentication Using Authentication
                  and Key Agreement {(AKA)} Version-2},
  journal      = {{RFC}},
  volume       = {4169},
  pages        = {1--13},
  year         = {2005},
  url          = {https://doi.org/10.17487/RFC4169},
  doi          = {10.17487/RFC4169},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4169.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/HastadN04,
  author       = {Johan H{\aa}stad and
                  Mats N{\"{a}}slund},
  title        = {The security of all {RSA} and discrete log bits},
  journal      = {J. {ACM}},
  volume       = {51},
  number       = {2},
  pages        = {187--230},
  year         = {2004},
  url          = {https://doi.org/10.1145/972639.972642},
  doi          = {10.1145/972639.972642},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/HastadN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/VascoNS04,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Mats N{\"{a}}slund and
                  Igor E. Shparlinski},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {New Results on the Hardness of Diffie-Hellman Bits},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {159--172},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_12},
  doi          = {10.1007/978-3-540-24632-9\_12},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/VascoNS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3711,
  author       = {Mark Baugher and
                  David A. McGrew and
                  Mats N{\"{a}}slund and
                  Elisabetta Carrara and
                  Karl Norrman},
  title        = {The Secure Real-time Transport Protocol {(SRTP)}},
  journal      = {{RFC}},
  volume       = {3711},
  pages        = {1--56},
  year         = {2004},
  url          = {https://doi.org/10.17487/RFC3711},
  doi          = {10.17487/RFC3711},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3711.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3830,
  author       = {Jari Arkko and
                  Elisabetta Carrara and
                  Fredrik Lindholm and
                  Mats N{\"{a}}slund and
                  Karl Norrman},
  title        = {{MIKEY:} Multimedia Internet KEYing},
  journal      = {{RFC}},
  volume       = {3830},
  pages        = {1--66},
  year         = {2004},
  url          = {https://doi.org/10.17487/RFC3830},
  doi          = {10.17487/RFC3830},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3830.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NaslundSW03,
  author       = {Mats N{\"{a}}slund and
                  Igor E. Shparlinski and
                  William Whyte},
  editor       = {Yvo Desmedt},
  title        = {On the Bit Security of NTRUEncrypt},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {62--70},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_5},
  doi          = {10.1007/3-540-36288-6\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NaslundSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiNS02,
  author       = {Wen{-}Ching W. Li and
                  Mats N{\"{a}}slund and
                  Igor E. Shparlinski},
  editor       = {Moti Yung},
  title        = {Hidden Number Problem with the Trace and Bit Security of {XTR} and
                  {LUC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {433--448},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_28},
  doi          = {10.1007/3-540-45708-9\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiNS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latin/VascoNS02,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Mats N{\"{a}}slund and
                  Igor E. Shparlinski},
  editor       = {Sergio Rajsbaum},
  title        = {The Hidden Number Problem in Extension Fields and Its Applications},
  booktitle    = {{LATIN} 2002: Theoretical Informatics, 5th Latin American Symposium,
                  Cancun, Mexico, April 3-6, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2286},
  pages        = {105--117},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45995-2\_14},
  doi          = {10.1007/3-540-45995-2\_14},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latin/VascoNS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwcn/BlomCLNN02,
  author       = {Rolf Blom and
                  Elisabetta Carrara and
                  Fredrik Lindholm and
                  Karl Norrman and
                  Mats N{\"{a}}slund},
  title        = {Conversational {IP} multimedia security},
  booktitle    = {Proceedings of The Fourth {IEEE} Conference on Mobile and Wireless
                  Communications Networks, {MWCN} 2002, September 9-11, 2002, Stockholm,
                  Sweden},
  pages        = {147--151},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/MWCN.2002.1045712},
  doi          = {10.1109/MWCN.2002.1045712},
  timestamp    = {Wed, 16 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwcn/BlomCLNN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GoldmannNR01,
  author       = {Mikael Goldmann and
                  Mats N{\"{a}}slund and
                  Alexander Russell},
  title        = {Complexity Bounds on General Hard-Core Predicates},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {3},
  pages        = {177--195},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0007-6},
  doi          = {10.1007/S00145-001-0007-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/GoldmannNR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HastadN01,
  author       = {Johan H{\aa}stad and
                  Mats N{\"{a}}slund},
  editor       = {Colin Boyd},
  title        = {Practical Construction and Analysis of Pseudo-Randomness Primitives},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {442--459},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_26},
  doi          = {10.1007/3-540-45682-1\_26},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HastadN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/NaslundR00,
  author       = {Mats N{\"{a}}slund and
                  Alexander Russell},
  title        = {Extraction of optimally unbiased bits from a biased source},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {3},
  pages        = {1093--1103},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.841191},
  doi          = {10.1109/18.841191},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/NaslundR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/arscom/Naslund99,
  author       = {Mats N{\"{a}}slund},
  title        = {On Steiner Triple Systems and Perfect Codes},
  journal      = {Ars Comb.},
  volume       = {53},
  year         = {1999},
  timestamp    = {Tue, 06 Jan 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/arscom/Naslund99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR99-037,
  author       = {Johan H{\aa}stad and
                  Mats N{\"{a}}slund},
  title        = {The Security of all {RSA} and Discrete Log Bits},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR99-037}},
  year         = {1999},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1999/TR99-037/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR99-037},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR99-037.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HastadN99,
  author       = {Johan H{\aa}stad and
                  Mats N{\"{a}}slund},
  title        = {Security of all {RSA} and Discrete Log Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HastadN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/HastadN98,
  author       = {Johan H{\aa}stad and
                  Mats N{\"{a}}slund},
  title        = {The Security of Individual {RSA} Bits},
  booktitle    = {39th Annual Symposium on Foundations of Computer Science, {FOCS} '98,
                  November 8-11, 1998, Palo Alto, California, {USA}},
  pages        = {510--521},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/SFCS.1998.743502},
  doi          = {10.1109/SFCS.1998.743502},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/HastadN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldmannN97,
  author       = {Mikael Goldmann and
                  Mats N{\"{a}}slund},
  editor       = {Burton S. Kaliski Jr.},
  title        = {The Complexity of Computing Hard Core Predicates},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052224},
  doi          = {10.1007/BFB0052224},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldmannN97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Naslund96,
  author       = {Mats N{\"{a}}slund},
  editor       = {Neal Koblitz},
  title        = {All Bits ax+b mod p are Hard (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {114--128},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_10},
  doi          = {10.1007/3-540-68697-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Naslund96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Naslund95,
  author       = {Mats N{\"{a}}slund},
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {Universal Hash Functions {\&} Hard Core Bits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  pages        = {356--366},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X\_29},
  doi          = {10.1007/3-540-49264-X\_29},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Naslund95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}