The following pages link to Thomas Johansson (Q218815):
Displaying 50 items.
- Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension (Q310244) (← links)
- Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications (Q398976) (← links)
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time (Q451122) (← links)
- A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences (Q488250) (← links)
- Improved distinguishers for HC-128 (Q766246) (← links)
- An overview of distinguishing attacks on stream ciphers (Q1032489) (← links)
- A shift register construction of unconditionally secure authentication codes (Q1321559) (← links)
- A fast correlation attack on LILI-128 (Q1603511) (← links)
- A reaction attack on the QC-LDPC McEliece cryptosystem (Q1673587) (← links)
- A new birthday-type algorithm for attacking the fresh re-keying countermeasure (Q1739216) (← links)
- Further results on asymmetric authentication schemes (Q1854283) (← links)
- Authentication codes for nontrusting parties obtained from rank metric codes (Q1904420) (← links)
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM (Q2096530) (← links)
- Grain-128AEADv2: strengthening the initialization against key reconstruction (Q2149811) (← links)
- Making the BKW algorithm practical for LWE (Q2152043) (← links)
- A novel CCA attack using decryption errors against LAC (Q2181875) (← links)
- Some cryptanalytic and coding-theoretic applications of a soft Stern algorithm (Q2274236) (← links)
- Decryption failure attacks on IND-CCA secure lattice-based schemes (Q2289446) (← links)
- Solving LPN using covering codes (Q2303453) (← links)
- An AEAD variant of the Grain stream cipher (Q2327175) (← links)
- A survey on fast correlation attacks (Q2376656) (← links)
- Coded-BKW with sieving (Q2412878) (← links)
- An efficient state recovery attack on the X-FCSR family of stream ciphers (Q2442642) (← links)
- A new decryption failure attack against HQC (Q2692347) (← links)
- (Q2741405) (← links)
- Analysis of Xorrotation with Application to an HC-128 Variant (Q2907389) (← links)
- Solving LPN Using Covering Codes (Q2938835) (← links)
- A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors (Q2958147) (← links)
- A New Algorithm for Solving Ring-LPN With a Reducible Polynomial (Q2977130) (← links)
- Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials (Q2989810) (← links)
- A Note on Fast Algebraic Attacks and Higher Order Nonlinearities (Q3019943) (← links)
- (Q3046357) (← links)
- On Equivalence Classes of Boolean Functions (Q3094998) (← links)
- Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere (Q3104729) (← links)
- An Efficient State Recovery Attack on X-FCSR-256 (Q3391560) (← links)
- Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings (Q3452337) (← links)
- Coded-BKW: Solving LWE Using Lattice Codes (Q3457103) (← links)
- A Key Recovery Attack on Edon80 (Q3498400) (← links)
- Two General Attacks on Pomaranch-Like Keystream Generators (Q3524896) (← links)
- Two New Attacks on the Self-Shrinking Generator (Q3548000) (← links)
- A Linear Distinguishing Attack on Scream (Q3548934) (← links)
- Breaking the F-FCSR-H Stream Cipher in Real Time (Q3600397) (← links)
- Cryptanalysis of Achterbahn (Q3618640) (← links)
- (Q4249278) (← links)
- (Q4250772) (← links)
- Lower bounds on the probability of deception in authentication with arbitration (Q4324126) (← links)
- (Q4341758) (← links)
- (Q4341759) (← links)
- (Q4365767) (← links)
- (Q4413853) (← links)