Thomas Johansson

From MaRDI portal
Person:218815

Available identifiers

zbMath Open johansson.thomasMaRDI QIDQ218815

List of research outcomes

PublicationDate of PublicationType
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS2023-05-26Paper
A new decryption failure attack against HQC2023-03-21Paper
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM2022-11-09Paper
Making the BKW algorithm practical for LWE2022-07-06Paper
Grain-128AEADv2: strengthening the initialization against key reconstruction2022-06-29Paper
Revisiting the Concrete Security of Goldreich’s Pseudorandom Generator2022-02-17Paper
A novel CCA attack using decryption errors against LAC2020-05-20Paper
Solving LPN using covering codes2020-03-03Paper
Decryption failure attacks on IND-CCA secure lattice-based schemes2020-01-28Paper
An AEAD variant of the Grain stream cipher2019-10-14Paper
Some cryptanalytic and coding-theoretic applications of a soft Stern algorithm2019-09-19Paper
On the Asymptotics of Solving the LWE Problem Using Coded-BKW With Sieving2019-07-19Paper
A new birthday-type algorithm for attacking the fresh re-keying countermeasure2019-04-26Paper
A Key Recovery Reaction Attack on QC-MDPC2019-03-28Paper
A reaction attack on the QC-LDPC McEliece cryptosystem2018-09-12Paper
Coded-BKW with sieving2018-04-06Paper
Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials2017-06-08Paper
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial2017-04-28Paper
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors2017-02-01Paper
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension2016-09-08Paper
Coded-BKW: Solving LWE Using Lattice Codes2015-12-10Paper
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings2015-11-11Paper
A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences2015-01-23Paper
Solving LPN Using Covering Codes2015-01-16Paper
Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x\) and some cryptographic applications]2014-08-18Paper
Linear Attacks on Stream Ciphers2014-08-07Paper
An efficient state recovery attack on the X-FCSR family of stream ciphers2014-04-01Paper
A survey on fast correlation attacks2013-06-24Paper
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time2012-09-21Paper
Analysis of Xorrotation with Application to an HC-128 Variant2012-09-07Paper
Improved distinguishers for HC-1282012-03-23Paper
Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere2011-12-16Paper
On Equivalence Classes of Boolean Functions2011-10-27Paper
A Note on Fast Algebraic Attacks and Higher Order Nonlinearities2011-07-29Paper
An overview of distinguishing attacks on stream ciphers2009-10-26Paper
An Efficient State Recovery Attack on X-FCSR-2562009-08-11Paper
Cryptanalysis of Achterbahn2009-04-02Paper
Breaking the F-FCSR-H Stream Cipher in Real Time2009-02-10Paper
Two New Attacks on the Self-Shrinking Generator2008-12-21Paper
A Linear Distinguishing Attack on Scream2008-12-21Paper
Two General Attacks on Pomaranch-Like Keystream Generators2008-09-16Paper
A Key Recovery Attack on Edon802008-05-15Paper
A Framework for Chosen IV Statistical Analysis of Stream Ciphers2008-04-11Paper
Fast Computation of Large Distributions and Its Cryptographic Applications2008-03-18Paper
Cryptanalysis of Achterbahn-Version 22007-11-29Paper
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 22007-11-29Paper
Cryptography and Coding2007-11-28Paper
Selected Areas in Cryptography2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
Fast Software Encryption2006-06-22Paper
Fast Software Encryption2006-06-22Paper
Fast Software Encryption2005-12-27Paper
Another attack on A5/12005-05-31Paper
A construction of resilient functions with high nonlinearity2005-05-31Paper
Theoretical analysis of a correlation attack based on convolutional codes2005-05-11Paper
On the complexity of some cryptographic problems based on the general decoding problem2005-05-11Paper
https://portal.mardi4nfdi.de/entity/Q30463572004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44348842003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44174092003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44138532003-07-21Paper
Further results on asymmetric authentication schemes2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q45379912002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q45368092002-10-07Paper
A fast correlation attack on LILI-1282002-07-14Paper
Almost \(k\)-wise independent sample spaces and their cryptologic applications2002-01-02Paper
https://portal.mardi4nfdi.de/entity/Q27414052001-10-14Paper
https://portal.mardi4nfdi.de/entity/Q49418552001-02-12Paper
https://portal.mardi4nfdi.de/entity/Q49453492000-03-23Paper
https://portal.mardi4nfdi.de/entity/Q42492782000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q49347032000-01-31Paper
A simple one-sweep algorithm for optimal APP symbol decoding of linear block codes1999-11-21Paper
https://portal.mardi4nfdi.de/entity/Q42507721999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43657671998-06-07Paper
https://portal.mardi4nfdi.de/entity/Q43417591997-09-17Paper
https://portal.mardi4nfdi.de/entity/Q43417581997-06-18Paper
On the cardinality of systematic authentication codes via error-correcting codes1997-01-28Paper
Authentication codes for nontrusting parties obtained from rank metric codes1995-12-20Paper
Lower bounds on the probability of deception in authentication with arbitration1995-03-01Paper
A shift register construction of unconditionally secure authentication codes1994-06-26Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Thomas Johansson