default search action
Thomas Johansson 0001
Person information
- affiliation: Lund University, Sweden
Other persons with the same name
- Thomas Johansson 0002 — Umeå University, Sweden
- Thomas Johansson 0003 — Ericsson Components AB, Kista, Sweden
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i31]Thomas Johansson, Mustafa Khairallah, Vu Nguyen:
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem. IACR Cryptol. ePrint Arch. 2025: 21 (2025) - 2024
- [j57]Qian Guo, Thomas Johansson, Vu Nguyen:
A New Sieving-Style Information-Set Decoding Algorithm. IEEE Trans. Inf. Theory 70(11): 8303-8319 (2024) - [c70]Navya Sivaraman, Simin Nadjm-Tehrani, Thomas Johansson:
Formal Analysis of Julia Key Agreement Protocol. ICICS (2) 2024: 171-190 - [c69]Vu Nguyen, Thomas Johansson, Qian Guo:
A Key-Recovery Attack on the LCMQ Authentication Protocol. ISIT 2024: 1824-1829 - [c68]Qian Guo, Denis Nabokov, Elias Suvanto, Thomas Johansson:
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures. USENIX Security Symposium 2024 - [i30]Dachao Wang, Alexander Maximov, Patrik Ekdahl, Thomas Johansson:
A new stand-alone MAC construct called SMAC. IACR Cryptol. ePrint Arch. 2024: 819 (2024) - 2023
- [j56]Kalle Ngo, Elena Dubrova, Thomas Johansson:
A side-channel attack on a masked and shuffled software implementation of Saber. J. Cryptogr. Eng. 13(4): 443-460 (2023) - [j55]Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson:
Cache-Timing Attack Against HQC. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 136-163 (2023) - [c67]Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson:
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes. ASIACRYPT (4) 2023: 203-236 - [c66]Thomas Johansson, Willi Meier, Vu Nguyen:
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs. ISIT 2023: 477-482 - [e6]Thomas Johansson, Daniel Smith-Tone:
Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings. Lecture Notes in Computer Science 14154, Springer 2023, ISBN 978-3-031-40002-5 [contents] - [i29]Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson:
Cache-timing attack against HQC. IACR Cryptol. ePrint Arch. 2023: 102 (2023) - [i28]Qian Guo, Thomas Johansson, Vu Nguyen:
A New Sieving-Style Information-Set Decoding Algorithm. IACR Cryptol. ePrint Arch. 2023: 247 (2023) - [i27]Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson:
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes. IACR Cryptol. ePrint Arch. 2023: 294 (2023) - 2022
- [j54]Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder:
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 223-263 (2022) - [j53]Qian Guo, Andreas Johansson, Thomas Johansson:
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 800-827 (2022) - [j52]Jing Yang, Qian Guo, Thomas Johansson, Michael Lentmaier:
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator. IEEE Trans. Inf. Theory 68(2): 1329-1354 (2022) - [j51]Thomas Johansson, Willi Meier, Vu Nguyen:
Attacks on the Firekite Cipher. IACR Trans. Symmetric Cryptol. 2022(3): 191-216 (2022) - [e5]Jung Hee Cheon, Thomas Johansson:
Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings. Lecture Notes in Computer Science 13512, Springer 2022, ISBN 978-3-031-17233-5 [contents] - [i26]Thomas Johansson, Willi Meier, Vu Nguyen:
Attacks on the Firekite cipher. IACR Cryptol. ePrint Arch. 2022: 148 (2022) - [i25]Qian Guo, Andreas Johansson, Thomas Johansson:
A Key-Recovery Side-Channel Attack on Classic McEliece. IACR Cryptol. ePrint Arch. 2022: 514 (2022) - 2021
- [j50]Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
Improvements on Making BKW Practical for Solving LWE. Cryptogr. 5(4): 31 (2021) - [j49]Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson:
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 676-707 (2021) - [j48]Jing Yang, Thomas Johansson, Alexander Maximov:
Improved guess-and-determine and distinguishing attacks on SNOW-V. IACR Trans. Symmetric Cryptol. 2021(3): 54-83 (2021) - [c65]Qian Guo, Thomas Johansson:
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS. ASIACRYPT (4) 2021: 33-62 - [c64]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. CANS 2021: 24-41 - [c63]Kalle Ngo, Elena Dubrova, Thomas Johansson:
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis. ASHES@CCS 2021: 51-61 - [c62]Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson:
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems. ISIT 2021: 1266-1271 - [c61]Patrik Ekdahl, Alexander Maximov, Thomas Johansson, Jing Yang:
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs. WISEC 2021: 261-272 - [i24]Jing Yang, Qian Guo, Thomas Johansson, Michael Lentmaier:
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator. CoRR abs/2103.02668 (2021) - [i23]Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson:
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM. IACR Cryptol. ePrint Arch. 2021: 79 (2021) - [i22]Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang:
SNOW-Vi: an extreme performance variant of SNOW-V for low-end CPUs. IACR Cryptol. ePrint Arch. 2021: 236 (2021) - [i21]Jing Yang, Thomas Johansson, Alexander Maximov:
New improved attacks on SNOW-V. IACR Cryptol. ePrint Arch. 2021: 544 (2021) - [i20]Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson:
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems. IACR Cryptol. ePrint Arch. 2021: 610 (2021) - [i19]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. IACR Cryptol. ePrint Arch. 2021: 751 (2021) - [i18]Kalle Ngo, Elena Dubrova, Thomas Johansson:
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis. IACR Cryptol. ePrint Arch. 2021: 902 (2021) - 2020
- [j47]Jing Yang, Thomas Johansson:
An overview of cryptographic primitives for possible use in 5G and beyond. Sci. China Inf. Sci. 63(12) (2020) - [j46]Qian Guo, Thomas Johansson, Carl Löndahl:
Solving LPN Using Covering Codes. J. Cryptol. 33(1): 1-33 (2020) - [j45]Jing Yang, Thomas Johansson, Alexander Maximov:
Spectral analysis of ZUC-256. IACR Trans. Symmetric Cryptol. 2020(1): 266-288 (2020) - [c60]Qian Guo, Thomas Johansson:
A New Decryption Failure Attack Against HQC. ASIACRYPT (1) 2020: 353-382 - [c59]Qian Guo, Thomas Johansson, Alexander Nilsson:
A Key-Recovery Timing Attack on Post-quantum Primitives Using the Fujisaki-Okamoto Transformation and Its Application on FrodoKEM. CRYPTO (2) 2020: 359-386 - [c58]Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
Making the BKW Algorithm Practical for LWE. INDOCRYPT 2020: 417-439 - [i17]Qian Guo, Thomas Johansson, Alexander Nilsson:
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM. IACR Cryptol. ePrint Arch. 2020: 743 (2020) - [i16]Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
Making the BKW Algorithm Practical for LWE. IACR Cryptol. ePrint Arch. 2020: 1467 (2020)
2010 – 2019
- 2019
- [j44]Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
Some cryptanalytic and coding-theoretic applications of a soft stern algorithm. Adv. Math. Commun. 13(4): 559-578 (2019) - [j43]Faina I. Solov'eva, Daniel Augot, Thomas Johansson, Marine Minier, Victor A. Zinoviev:
Editorial: Special issue on coding and cryptography. Des. Codes Cryptogr. 87(2-3): 183-184 (2019) - [j42]Qian Guo, Thomas Johansson:
A new birthday-type algorithm for attacking the fresh re-keying countermeasure. Inf. Process. Lett. 146: 30-34 (2019) - [j41]Alexander Nilsson, Thomas Johansson, Paul Stankovski:
Error Amplification in Code-based Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 238-258 (2019) - [j40]Qian Guo, Thomas Johansson, Paul Stankovski Wagner:
A Key Recovery Reaction Attack on QC-MDPC. IEEE Trans. Inf. Theory 65(3): 1845-1861 (2019) - [j39]Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
On the Asymptotics of Solving the LWE Problem Using Coded-BKW With Sieving. IEEE Trans. Inf. Theory 65(8): 5243-5259 (2019) - [j38]Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang:
A new SNOW stream cipher called SNOW-V. IACR Trans. Symmetric Cryptol. 2019(3): 1-42 (2019) - [j37]Jing Yang, Thomas Johansson, Alexander Maximov:
Vectorized linear approximations for attacks on SNOW 3G. IACR Trans. Symmetric Cryptol. 2019(4): 249-271 (2019) - [c57]Qian Guo, Thomas Johansson, Jing Yang:
A Novel CCA Attack Using Decryption Errors Against LAC. ASIACRYPT (1) 2019: 82-111 - [c56]Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida:
An AEAD Variant of the Grain Stream Cipher. C2SI 2019: 55-71 - [c55]Irina E. Bocharova, Thomas Johansson, Boris D. Kudryashov:
Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem. ISIT 2019: 1882-1886 - [c54]Jan-Pieter D'Anvers, Qian Guo, Thomas Johansson, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede:
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes. Public Key Cryptography (2) 2019: 565-598 - [i15]Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving. IACR Cryptol. ePrint Arch. 2019: 9 (2019) - [i14]Qian Guo, Thomas Johansson, Alexander Nilsson:
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke. IACR Cryptol. ePrint Arch. 2019: 43 (2019) - [i13]Jing Yang, Thomas Johansson, Alexander Maximov:
Vectorized linear approximations for attacks on SNOW 3G. IACR Cryptol. ePrint Arch. 2019: 991 (2019) - [i12]Qian Guo, Thomas Johansson, Jing Yang:
A Novel CCA Attack using Decryption Errors against LAC. IACR Cryptol. ePrint Arch. 2019: 1308 (2019) - [i11]Jing Yang, Thomas Johansson, Alexander Maximov:
Spectral analysis of ZUC-256. IACR Cryptol. ePrint Arch. 2019: 1352 (2019) - 2018
- [c53]Jean-Christophe Deneuville, Philippe Gaborit, Qian Guo, Thomas Johansson:
Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol. ISIT 2018: 1450-1454 - [i10]Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang:
A new SNOW stream cipher called SNOW-V. IACR Cryptol. ePrint Arch. 2018: 1143 (2018) - [i9]Alexander Nilsson, Thomas Johansson, Paul Stankovski:
Error Amplification in Code-based Cryptography. IACR Cryptol. ePrint Arch. 2018: 1223 (2018) - 2017
- [j36]Pascale Charpin, Thomas Johansson, Gohar M. Kyureghyan, Nicolas Sendrier, Jean-Pierre Tillich:
Editorial: Special issue on coding and cryptography. Des. Codes Cryptogr. 82(1-2): 1-2 (2017) - [c52]Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski:
Coded-BKW with Sieving. ASIACRYPT (1) 2017: 323-346 - [c51]Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski:
Information set decoding with soft information and some cryptographic applications. ISIT 2017: 1793-1797 - [c50]Tomás Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson:
A Reaction Attack on the QC-LDPC McEliece Cryptosystem. PQCrypto 2017: 51-68 - [i8]Tomás Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson:
A Reaction Attack on the QC-LDPC McEliece Cryptosystem. IACR Cryptol. ePrint Arch. 2017: 494 (2017) - 2016
- [j35]Carl Löndahl, Thomas Johansson, Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension. Des. Codes Cryptogr. 80(2): 359-377 (2016) - [j34]Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari, Thomas Johansson, Mohammad Reza Aref:
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes. IET Inf. Secur. 10(4): 194-202 (2016) - [c49]Qian Guo, Thomas Johansson, Paul Stankovski:
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors. ASIACRYPT (1) 2016: 789-815 - [c48]Qian Guo, Thomas Johansson:
A p-ary MDPC scheme. ISIT 2016: 1356-1360 - [i7]Qian Guo, Thomas Johansson:
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure. IACR Cryptol. ePrint Arch. 2016: 225 (2016) - [i6]Qian Guo, Thomas Johansson, Paul Stankovski:
Coded-BKW: Solving LWE Using Lattice Codes. IACR Cryptol. ePrint Arch. 2016: 310 (2016) - [i5]Qian Guo, Thomas Johansson, Paul Stankovski:
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors. IACR Cryptol. ePrint Arch. 2016: 858 (2016) - 2015
- [j33]Hui Wang, Paul Stankovski, Thomas Johansson:
A generalized birthday approach for efficiently finding linear relations in ℓ-sequences. Des. Codes Cryptogr. 74(1): 41-57 (2015) - [j32]Qian Guo, Thomas Johansson, Carl Löndahl:
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial. IEEE Trans. Inf. Theory 61(11): 6204-6212 (2015) - [c47]Qian Guo, Thomas Johansson, Paul Stankovski:
Coded-BKW: Solving LWE Using Lattice Codes. CRYPTO (1) 2015: 23-42 - 2014
- [j31]Carl Löndahl, Thomas Johansson:
Improved algorithms for finding low-weight polynomial multiples in F2[x] and some cryptographic applications. Des. Codes Cryptogr. 73(2): 625-640 (2014) - [j30]Paul Stankovski, Martin Hell, Thomas Johansson:
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers. J. Cryptol. 27(1): 1-22 (2014) - [c46]Qian Guo, Thomas Johansson, Carl Löndahl:
Solving LPN Using Covering Codes. ASIACRYPT (1) 2014: 1-20 - [i4]Qian Guo, Thomas Johansson, Carl Löndahl:
A New Algorithm for Solving Ring-LPN with a Reducible Polynomial. CoRR abs/1409.0472 (2014) - 2013
- [j29]Hui Wang, Martin Hell, Thomas Johansson, Martin Ågren:
Improved Key Recovery Attack on the BEAN Stream Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1437-1444 (2013) - [e4]Thomas Johansson, Phong Q. Nguyen:
Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. Lecture Notes in Computer Science 7881, Springer 2013, ISBN 978-3-642-38347-2 [contents] - 2012
- [j28]Martin Ågren, Carl Löndahl, Martin Hell, Thomas Johansson:
A survey on fast correlation attacks. Cryptogr. Commun. 4(3-4): 173-202 (2012) - [j27]Paul Stankovski, Sushmita Ruj, Martin Hell, Thomas Johansson:
Improved distinguishers for HC-128. Des. Codes Cryptogr. 63(2): 225-240 (2012) - [j26]Qichun Wang, Thomas Johansson, Haibin Kan:
Some results on fast algebraic attacks and higher-order non-linearities. IET Inf. Secur. 6(1): 41-46 (2012) - [j25]Martin Ågren, Martin Hell, Thomas Johansson:
On hardware-oriented message authentication. IET Inf. Secur. 6(4): 329-336 (2012) - [j24]Martin Hell, Thomas Johansson, Lennart Brynielsson, Håkan Englund:
Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials. IEEE Trans. Inf. Theory 58(9): 6183-6193 (2012) - [c45]Paul Stankovski, Martin Hell, Thomas Johansson:
Analysis of Xorrotation with Application to an HC-128 Variant. ACISP 2012: 419-425 - [c44]Carl Löndahl, Thomas Johansson:
A New Version of McEliece PKC Based on Convolutional Codes. ICICS 2012: 461-470 - [c43]Martin Ågren, Martin Hell, Thomas Johansson, Carl Löndahl:
Improved message passing techniques in fast correlation attacks on stream ciphers. ISTC 2012: 260-264 - [c42]Leonardo A. Martucci, Albin Zuccato, Ben J. M. Smeets, Sheikh Mahbub Habib, Thomas Johansson, Nahid Shahmehri:
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry. UIC/ATC 2012: 627-632 - [e3]David Pointcheval, Thomas Johansson:
Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings. Lecture Notes in Computer Science 7237, Springer 2012, ISBN 978-3-642-29010-7 [contents] - 2011
- [j23]Martin Ågren, Martin Hell, Thomas Johansson, Willi Meier:
Grain-128a: a new version of Grain-128 with optional authentication. Int. J. Wirel. Mob. Comput. 5(1): 48-59 (2011) - [j22]Martin Hell, Thomas Johansson:
Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time. J. Cryptol. 24(3): 427-445 (2011) - [c41]Martin Ågren, Thomas Johansson:
Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere. INDOCRYPT 2011: 114-133 - [i3]Martin Ågren, Thomas Johansson:
Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere. IACR Cryptol. ePrint Arch. 2011: 423 (2011) - 2010
- [c40]Qichun Wang, Thomas Johansson:
A Note on Fast Algebraic Attacks and Higher Order Nonlinearities. Inscrypt 2010: 404-414 - [c39]Qichun Wang, Thomas Johansson:
On Equivalence Classes of Boolean Functions. ICISC 2010: 311-324
2000 – 2009
- 2009
- [j21]Martin Hell, Thomas Johansson, Lennart Brynielsson:
An overview of distinguishing attacks on stream ciphers. Cryptogr. Commun. 1(1): 71-94 (2009) - [c38]Martin Ågren, Thomas Johansson, Martin Hell:
Improving the Rainbow Attack by Reusing Colours. CANS 2009: 362-378 - [c37]Paul Stankovski, Martin Hell, Thomas Johansson:
An Efficient State Recovery Attack on X-FCSR-256. FSE 2009: 23-37 - 2008
- [c36]Martin Hell, Thomas Johansson:
Breaking the F-FCSR-H Stream Cipher in Real Time. ASIACRYPT 2008: 557-569 - [p1]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier:
The Grain Family of Stream Ciphers. The eSTREAM Finalists 2008: 179-190 - 2007
- [j20]Martin Hell, Thomas Johansson:
Cryptanalysis of Achterbahn-128/80. IET Inf. Secur. 1(2): 47-52 (2007) - [j19]Martin Hell, Thomas Johansson, Willi Meier:
Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2(1): 86-93 (2007) - [j18]Alexander Maximov, Thomas Johansson:
A Linear Distinguishing Attack on Scream. IEEE Trans. Inf. Theory 53(9): 3127-3144 (2007) - [c35]Martin Hell, Thomas Johansson:
A Key Recovery Attack on Edon80. ASIACRYPT 2007: 568-581 - [c34]Håkan Englund, Martin Hell, Thomas Johansson:
Two General Attacks on Pomaranch-Like Keystream Generators. FSE 2007: 274-289 - [c33]Håkan Englund, Thomas Johansson, Meltem Sönmez Turan:
A Framework for Chosen IV Statistical Analysis of Stream Ciphers. INDOCRYPT 2007: 268-281 - [c32]Håkan Englund, Martin Hell, Thomas Johansson:
A Note on Distinguishing Attacks. ITW 2007: 1-4 - 2006
- [j17]Håkan Englund, Thomas Johansson:
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. Int. J. Secur. Networks 1(1/2): 95-102 (2006) - [j16]Martin Hell, Thomas Johansson:
Two New Attacks on the Self-Shrinking Generator. IEEE Trans. Inf. Theory 52(8): 3837-3843 (2006) - [c31]Thomas Johansson, Willi Meier, Frédéric Muller:
Cryptanalysis of Achterbahn. FSE 2006: 1-14 - [c30]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier:
A Stream Cipher Proposal: Grain-128. ISIT 2006: 1614-1618 - [c29]Martin Hell, Thomas Johansson:
Cryptanalysis of Achterbahn-Version 2. Selected Areas in Cryptography 2006: 45-55 - [c28]Martin Hell, Thomas Johansson:
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2. Selected Areas in Cryptography 2006: 220-233 - 2005
- [c27]Alexander Maximov, Thomas Johansson:
Fast Computation of Large Distributions and Its Cryptographic Applications. ASIACRYPT 2005: 313-332 - [c26]Wenhai Fang, Thomas Johansson, Lambert Spaanenburg:
Snow 2.0 IP Core for Trusted Hardware. FPL 2005: 281-286 - [c25]Håkan Englund, Thomas Johansson:
A New Distinguisher for Clock Controlled Stream Ciphers. FSE 2005: 181-195 - [c24]Martin Hell, Thomas Johansson:
Some Attacks on the Bit-Search Generator. FSE 2005: 215-227 - 2004
- [j15]A. Trofimov, Thomas Johansson:
A memory-efficient optimal APP symbol-decoding algorithm for linear block codes. IEEE Trans. Commun. 52(9): 1429-1434 (2004) - [c23]Håkan Englund, Martin Hell, Thomas Johansson:
Correlation Attacks Using a New Class of Weak Feedback Polynomials. FSE 2004: 127-142 - [c22]Alexander Maximov, Thomas Johansson, Steve Babbage:
An Improved Correlation Attack on A5/1. Selected Areas in Cryptography 2004: 1-18 - [c21]Håkan Englund, Thomas Johansson:
A New Simple Technique to Attack Filter Generators and Related Ciphers. Selected Areas in Cryptography 2004: 39-53 - 2003
- [j14]Patrik Ekdahl, Thomas Johansson:
Another attack on A5/1. IEEE Trans. Inf. Theory 49(1): 284-289 (2003) - [j13]Thomas Johansson, Enes Pasalic:
A construction of resilient functions with high nonlinearity. IEEE Trans. Inf. Theory 49(2): 494-501 (2003) - [c20]Patrik Ekdahl, Willi Meier, Thomas Johansson:
Predicting the Shrinking Generator with Fixed Connections. EUROCRYPT 2003: 330-344 - [c19]Thomas Johansson:
Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. IMACC 2003: 66 - [e2]Thomas Johansson:
Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers. Lecture Notes in Computer Science 2887, Springer 2003, ISBN 3-540-20449-0 [contents] - [e1]Thomas Johansson, Subhamoy Maitra:
Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2904, Springer 2003, ISBN 3-540-20609-4 [contents] - 2002
- [j12]Fredrik Jönsson, Thomas Johansson:
A fast correlation attack on LILI-128. Inf. Process. Lett. 81(3): 127-132 (2002) - [j11]Alexei V. Ourivski, Thomas Johansson:
New Technique for Decoding Codes in the Rank Metric and Its Cryptography Applications. Probl. Inf. Transm. 38(3): 237-246 (2002) - [j10]Thomas Johansson, Fredrik Jönsson:
Theoretical analysis of a correlation attack based on convolutional codes. IEEE Trans. Inf. Theory 48(8): 2173-2181 (2002) - [j9]Thomas Johansson, Fredrik Jönsson:
On the complexity of some cryptographic problems based on the general decoding problem. IEEE Trans. Inf. Theory 48(10): 2669-2678 (2002) - [c18]Patrik Ekdahl, Thomas Johansson:
Distinguishing Attacks on SOBER-t16 and t32. FSE 2002: 210-224 - [c17]Soumen Maity, Thomas Johansson:
Construction of Cryptographically Important Boolean Functions. INDOCRYPT 2002: 234-245 - [c16]Patrik Ekdahl, Thomas Johansson:
A New Version of the Stream Cipher SNOW. Selected Areas in Cryptography 2002: 47-61 - 2001
- [j8]Emir Pasalic, Subhamoy Maitra, Thomas Johansson, Palash Sarkar:
New Constructions of Resilient and Correlation Immune Boolean Functions Achieving Upper Bound on Nonlinearity. Electron. Notes Discret. Math. 6: 158-167 (2001) - [j7]Kaoru Kurosawa, Thomas Johansson, Douglas R. Stinson:
Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications. J. Cryptol. 14(4): 231-253 (2001) - 2000
- [c15]Thomas Johansson, Fredrik Jönsson:
Fast Correlation Attacks through Reconstruction of Linear Polynomials. CRYPTO 2000: 300-315 - [c14]Vladimir V. Chepyzhov, Thomas Johansson, Ben J. M. Smeets:
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. FSE 2000: 181-195 - [i2]Enes Pasalic, Thomas Johansson, Subhamoy Maitra, Palash Sarkar:
New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity. IACR Cryptol. ePrint Arch. 2000: 48 (2000) - [i1]Thomas Johansson, Enes Pasalic:
A Construction of Resilient Functions with High Nonlinearity. IACR Cryptol. ePrint Arch. 2000: 53 (2000)
1990 – 1999
- 1999
- [j6]Thomas Johansson:
Further Results on Asymmetric Authentication Schemes. Inf. Comput. 151(1-2): 100-133 (1999) - [c13]Thomas Johansson, Fredrik Jönsson:
Fast Correlation Attacks Based on Turbo Code Techniques. CRYPTO 1999: 181-197 - [c12]Thomas Johansson, Fredrik Jönsson:
Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes. EUROCRYPT 1999: 347-362 - [c11]Enes Pasalic, Thomas Johansson:
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions. IMACC 1999: 35-44 - 1998
- [j5]Thomas Johansson, Kamil Sh. Zigangirov:
A Simple One-Sweep Algorithm for Optimal APP Symbol Decoding of Linear Block Codes. IEEE Trans. Inf. Theory 44(7): 3124-3129 (1998) - [c10]Thomas Johansson:
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. ASIACRYPT 1998: 342-356 - 1997
- [c9]Thomas Johansson:
Bucket Hashing with a Small Key Size. EUROCRYPT 1997: 149-162 - [c8]Kaoru Kurosawa, Thomas Johansson, Douglas R. Stinson:
Almost k-wise Independent Sample Spaces and Their Cryptologic Applications. EUROCRYPT 1997: 409-421 - 1996
- [j4]Gregory Kabatianskii, Ben J. M. Smeets, Thomas Johansson:
On the cardinality of systematic authentication codes via error-correcting codes. IEEE Trans. Inf. Theory 42(2): 566-578 (1996) - [c7]Tor Helleseth, Thomas Johansson:
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. CRYPTO 1996: 31-44 - 1995
- [j3]Thomas Johansson:
Authentication Codes for Nontrusting Parties Obtained from Rank Metric Codes. Des. Codes Cryptogr. 6(3): 205-218 (1995) - 1994
- [j2]Thomas Johansson:
A Shift Register Construction of Unconditionally Secure Authentication Codes. Des. Codes Cryptogr. 4(1): 69-81 (1994) - [j1]Thomas Johansson:
Lower bounds on the probability of deception in authentication with arbitration. IEEE Trans. Inf. Theory 40(5): 1573-1585 (1994) - [c6]Thomas Johansson, Ben J. M. Smeets:
On A²-Codes Including Arbiter's Attacks. EUROCRYPT 1994: 456-460 - [c5]Thomas Johansson, Ewert Bengtsson:
Parallel algorithms on compact binary objects. ICPR (3) 1994: 370-372 - [c4]Thomas Johansson, Ewert Bengtsson:
A New Parallel MIMD Connected Component Labeling Algorithm. PARLE 1994: 801-804 - 1993
- [c3]Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets:
On Families of Hash Functions via Geometric Codes and Concatenation. CRYPTO 1993: 331-342 - [c2]Thomas Johansson:
On the Construction of Perfect Authentication Codes that Permit Arbitration. CRYPTO 1993: 343-354 - [c1]Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets:
On the Relation between A-Codes and Codes Correcting Independent Errors. EUROCRYPT 1993: 1-11
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint