Thomas Johansson

From MaRDI portal
Person:218815

Available identifiers

zbMath Open johansson.thomasMaRDI QIDQ218815

List of research outcomes





PublicationDate of PublicationType
A new sieving-style information-set decoding algorithm2025-01-23Paper
SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes2024-09-13Paper
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS2023-05-26Paper
A new decryption failure attack against HQC2023-03-21Paper
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM2022-11-09Paper
Making the BKW algorithm practical for LWE2022-07-06Paper
Grain-128AEADv2: strengthening the initialization against key reconstruction2022-06-29Paper
Revisiting the Concrete Security of Goldreich’s Pseudorandom Generator2022-02-17Paper
A novel CCA attack using decryption errors against LAC2020-05-20Paper
Solving LPN using covering codes2020-03-03Paper
Decryption failure attacks on IND-CCA secure lattice-based schemes2020-01-28Paper
An AEAD variant of the Grain stream cipher2019-10-14Paper
Some cryptanalytic and coding-theoretic applications of a soft Stern algorithm2019-09-19Paper
On the Asymptotics of Solving the LWE Problem Using Coded-BKW With Sieving2019-07-19Paper
A new birthday-type algorithm for attacking the fresh re-keying countermeasure2019-04-26Paper
A Key Recovery Reaction Attack on QC-MDPC2019-03-28Paper
A reaction attack on the QC-LDPC McEliece cryptosystem2018-09-12Paper
Coded-BKW with sieving2018-04-06Paper
Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials2017-06-08Paper
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial2017-04-28Paper
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors2017-02-01Paper
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension2016-09-08Paper
Coded-BKW: Solving LWE Using Lattice Codes2015-12-10Paper
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings2015-11-11Paper
A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences2015-01-23Paper
Solving LPN Using Covering Codes2015-01-16Paper
Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications2014-08-18Paper
Linear Attacks on Stream Ciphers2014-08-07Paper
An efficient state recovery attack on the X-FCSR family of stream ciphers2014-04-01Paper
A survey on fast correlation attacks2013-06-24Paper
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time2012-09-21Paper
Analysis of Xorrotation with Application to an HC-128 Variant2012-09-07Paper
Improved distinguishers for HC-1282012-03-23Paper
Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere2011-12-16Paper
On Equivalence Classes of Boolean Functions2011-10-27Paper
A Note on Fast Algebraic Attacks and Higher Order Nonlinearities2011-07-29Paper
An overview of distinguishing attacks on stream ciphers2009-10-26Paper
An Efficient State Recovery Attack on X-FCSR-2562009-08-11Paper
Cryptanalysis of Achterbahn2009-04-02Paper
Breaking the F-FCSR-H Stream Cipher in Real Time2009-02-10Paper
Two New Attacks on the Self-Shrinking Generator2008-12-21Paper
A Linear Distinguishing Attack on Scream2008-12-21Paper
Two General Attacks on Pomaranch-Like Keystream Generators2008-09-16Paper
A Key Recovery Attack on Edon802008-05-15Paper
A Framework for Chosen IV Statistical Analysis of Stream Ciphers2008-04-11Paper
Fast Computation of Large Distributions and Its Cryptographic Applications2008-03-18Paper
Cryptanalysis of Achterbahn-Version 22007-11-29Paper
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 22007-11-29Paper
Cryptography and Coding2007-11-28Paper
Selected Areas in Cryptography2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
Fast Software Encryption2006-06-22Paper
Fast Software Encryption2006-06-22Paper
Fast Software Encryption2005-12-27Paper
A construction of resilient functions with high nonlinearity2005-05-31Paper
Another attack on A5/12005-05-31Paper
Theoretical analysis of a correlation attack based on convolutional codes2005-05-11Paper
On the complexity of some cryptographic problems based on the general decoding problem2005-05-11Paper
https://portal.mardi4nfdi.de/entity/Q30463572004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44348842003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44174092003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44138532003-07-21Paper
Further results on asymmetric authentication schemes2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q45379912002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q45368092002-10-07Paper
A fast correlation attack on LILI-1282002-07-14Paper
Almost \(k\)-wise independent sample spaces and their cryptologic applications2002-01-02Paper
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity2001-10-14Paper
https://portal.mardi4nfdi.de/entity/Q49418552001-02-12Paper
https://portal.mardi4nfdi.de/entity/Q49453492000-03-23Paper
https://portal.mardi4nfdi.de/entity/Q42492782000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q49347032000-01-31Paper
A simple one-sweep algorithm for optimal APP symbol decoding of linear block codes1999-11-21Paper
https://portal.mardi4nfdi.de/entity/Q42507721999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43657671998-06-07Paper
https://portal.mardi4nfdi.de/entity/Q43417591997-09-17Paper
https://portal.mardi4nfdi.de/entity/Q43417581997-06-18Paper
On the cardinality of systematic authentication codes via error-correcting codes1997-01-28Paper
Authentication codes for nontrusting parties obtained from rank metric codes1995-12-20Paper
Lower bounds on the probability of deception in authentication with arbitration1995-03-01Paper
A shift register construction of unconditionally secure authentication codes1994-06-26Paper

Research outcomes over time

This page was built for person: Thomas Johansson