Thomas Johansson

According to our database1, Thomas Johansson authored at least 101 papers between 1993 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Solving LPN Using Covering Codes.
J. Cryptology, 2020

2019
A Key Recovery Reaction Attack on QC-MDPC.
IEEE Trans. Information Theory, 2019

On the Asymptotics of Solving the LWE Problem Using Coded-BKW With Sieving.
IEEE Trans. Information Theory, 2019

Error Amplification in Code-based Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

A new birthday-type algorithm for attacking the fresh re-keying countermeasure.
Inf. Process. Lett., 2019

Vectorized linear approximations for attacks on SNOW 3G.
IACR Cryptology ePrint Archive, 2019

Spectral analysis of ZUC-256.
IACR Cryptology ePrint Archive, 2019

A Novel CCA Attack using Decryption Errors against LAC.
IACR Cryptology ePrint Archive, 2019

A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke.
IACR Cryptology ePrint Archive, 2019

Editorial: Special issue on coding and cryptography.
Des. Codes Cryptogr., 2019

Some cryptanalytic and coding-theoretic applications of a soft stern algorithm.
Adv. in Math. of Comm., 2019

Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem.
Proceedings of the IEEE International Symposium on Information Theory, 2019

An AEAD Variant of the Grain Stream Cipher.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
A new SNOW stream cipher called SNOW-V.
IACR Cryptology ePrint Archive, 2018

Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
A Reaction Attack on the QC-LDPC McEliece Cryptosystem.
IACR Cryptology ePrint Archive, 2017

Editorial: Special issue on coding and cryptography.
Des. Codes Cryptogr., 2017

Information set decoding with soft information and some cryptographic applications.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Coded-BKW with Sieving.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes.
IET Information Security, 2016

A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.
IACR Cryptology ePrint Archive, 2016

Coded-BKW: Solving LWE Using Lattice Codes.
IACR Cryptology ePrint Archive, 2016

Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension.
Des. Codes Cryptogr., 2016

A p-ary MDPC scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial.
IEEE Trans. Information Theory, 2015

A generalized birthday approach for efficiently finding linear relations in ℓ-sequences.
Des. Codes Cryptogr., 2015

2014
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers.
J. Cryptology, 2014

Improved algorithms for finding low-weight polynomial multiples in F2[x] and some cryptographic applications.
Des. Codes Cryptogr., 2014

2013
Improved Key Recovery Attack on the BEAN Stream Cipher.
IEICE Transactions, 2013

2012
Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials.
IEEE Trans. Information Theory, 2012

On hardware-oriented message authentication.
IET Information Security, 2012

Improved distinguishers for HC-128.
Des. Codes Cryptogr., 2012

A survey on fast correlation attacks.
Cryptography and Communications, 2012

Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Improved message passing techniques in fast correlation attacks on stream ciphers.
Proceedings of the 7th International Symposium on Turbo Codes and Iterative Information Processing, 2012

A New Version of McEliece PKC Based on Convolutional Codes.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Analysis of Xorrotation with Application to an HC-128 Variant.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time.
J. Cryptology, 2011

Grain-128a: a new version of Grain-128 with optional authentication.
IJWMC, 2011

Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere.
IACR Cryptology ePrint Archive, 2011

2010
On Equivalence Classes of Boolean Functions.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

A Note on Fast Algebraic Attacks and Higher Order Nonlinearities.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
An overview of distinguishing attacks on stream ciphers.
Cryptography and Communications, 2009

An Efficient State Recovery Attack on X-FCSR-256.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Improving the Rainbow Attack by Reusing Colours.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
The Grain Family of Stream Ciphers.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

Breaking the F-FCSR-H Stream Cipher in Real Time.
Proceedings of the Advances in Cryptology, 2008

2007
A Linear Distinguishing Attack on Scream.
IEEE Trans. Information Theory, 2007

Grain: a stream cipher for constrained environments.
IJWMC, 2007

A Note on Distinguishing Attacks.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

A Framework for Chosen IV Statistical Analysis of Stream Ciphers.
Proceedings of the Progress in Cryptology, 2007

Two General Attacks on Pomaranch-Like Keystream Generators.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

A Key Recovery Attack on Edon80.
Proceedings of the Advances in Cryptology, 2007

2006
Two New Attacks on the Self-Shrinking Generator.
IEEE Trans. Information Theory, 2006

Three ways to mount distinguishing attacks on irregularly clocked stream ciphers.
IJSN, 2006

On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Cryptanalysis of Achterbahn-Version 2.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

A Stream Cipher Proposal: Grain-128.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Cryptanalysis of Achterbahn.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Some Attacks on the Bit-Search Generator.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

A New Distinguisher for Clock Controlled Stream Ciphers.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Snow 2.0 IP Core for Trusted Hardware.
Proceedings of the 2005 International Conference on Field Programmable Logic and Applications (FPL), 2005

Fast Computation of Large Distributions and Its Cryptographic Applications.
Proceedings of the Advances in Cryptology, 2005

2004
A memory-efficient optimal APP symbol-decoding algorithm for linear block codes.
IEEE Trans. Communications, 2004

An Improved Correlation Attack on A5/1.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

A New Simple Technique to Attack Filter Generators and Related Ciphers.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Correlation Attacks Using a New Class of Weak Feedback Polynomials.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
A construction of resilient functions with high nonlinearity.
IEEE Trans. Information Theory, 2003

Another attack on A5/1.
IEEE Trans. Information Theory, 2003

Analysis and Design of Modern Stream Ciphers: (Invited Paper) p.
Proceedings of the Cryptography and Coding, 2003

Predicting the Shrinking Generator with Fixed Connections.
Proceedings of the Advances in Cryptology, 2003

2002
On the complexity of some cryptographic problems based on the general decoding problem.
IEEE Trans. Information Theory, 2002

Theoretical analysis of a correlation attack based on convolutional codes.
IEEE Trans. Information Theory, 2002

New Technique for Decoding Codes in the Rank Metric and Its Cryptography Applications.
Probl. Inf. Transm., 2002

A fast correlation attack on LILI-128.
Inf. Process. Lett., 2002

A New Version of the Stream Cipher SNOW.
Proceedings of the Selected Areas in Cryptography, 2002

Construction of Cryptographically Important Boolean Functions.
Proceedings of the Progress in Cryptology, 2002

Distinguishing Attacks on SOBER-t16 and t32.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

2001
Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications.
J. Cryptology, 2001

New Constructions of Resilient and Correlation Immune Boolean Functions Achieving Upper Bound on Nonlinearity.
Electron. Notes Discret. Math., 2001

2000
New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity.
IACR Cryptology ePrint Archive, 2000

A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Fast Correlation Attacks through Reconstruction of Linear Polynomials.
Proceedings of the Advances in Cryptology, 2000

1999
Further Results on Asymmetric Authentication Schemes.
Inf. Comput., 1999

Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions.
Proceedings of the Cryptography and Coding, 1999

Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes.
Proceedings of the Advances in Cryptology, 1999

Fast Correlation Attacks Based on Turbo Code Techniques.
Proceedings of the Advances in Cryptology, 1999

1998
A Simple One-Sweep Algorithm for Optimal APP Symbol Decoding of Linear Block Codes.
IEEE Trans. Information Theory, 1998

Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators.
Proceedings of the Advances in Cryptology, 1998

1997
Bucket Hashing with a Small Key Size.
Proceedings of the Advances in Cryptology, 1997

1996
On the cardinality of systematic authentication codes via error-correcting codes.
IEEE Trans. Information Theory, 1996

Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings.
Proceedings of the Advances in Cryptology, 1996

1995
Authentication Codes for Nontrusting Parties Obtained from Rank Metric Codes.
Des. Codes Cryptogr., 1995

1994
Lower bounds on the probability of deception in authentication with arbitration.
IEEE Trans. Information Theory, 1994

A Shift Register Construction of Unconditionally Secure Authentication Codes.
Des. Codes Cryptogr., 1994

A New Parallel MIMD Connected Component Labeling Algorithm.
Proceedings of the PARLE '94: Parallel Architectures and Languages Europe, 1994

On A²-Codes Including Arbiter's Attacks.
Proceedings of the Advances in Cryptology, 1994

1993
On the Relation between A-Codes and Codes Correcting Independent Errors.
Proceedings of the Advances in Cryptology, 1993

On the Construction of Perfect Authentication Codes that Permit Arbitration.
Proceedings of the Advances in Cryptology, 1993

On Families of Hash Functions via Geometric Codes and Concatenation.
Proceedings of the Advances in Cryptology, 1993


  Loading...