Paul StankovskiSenior Lecturer, Associate Professor
More filtering options
  1. 2018
  2. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski 2018 Jan 1 Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer Verlag, p. 273-294 22 p. (Communications in Computer and Information Science; vol. 867)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  3. 2017
  4. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski 2017 Feb Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1, p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson 2017 Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer Verlag, Vol. 10346 LNCS, p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  6. Coded-BKW with Sieving: An Improved Algorithm for Solving the LWE Problem

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski 2017 Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 323-346 (Lecture Notes in Computer Science; vol. 10624)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  7. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski 2017 IEEE International Symposium on Information Theory (ISIT). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. 2016
  9. Autonomy in PhD-education – Supervising for Independence

    Mattias Borg, Fredrik Kopsch, Torgny Roxå, Paul Stankovski & Johannes Svensson 2016 Dec 15 LTHs 9:e Pedagogiska Inspirationskonferens. Andersson, R. & Tempte, L. (eds.). LTH, Lund University, p. 9-13 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  10. A key recovery attack on MDPC with CCA security using decoding errors

    Qian Guo, Thomas Johansson & Paul Stankovski 2016 Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, Vol. 10031 LNCS, p. 789-815 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  11. 2015
  12. Coded-BKW: Solving LWE Using Lattice Codes.

    Qian Guo, Thomas Johansson & Paul Stankovski 2015 Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (eds.). Springer, Vol. 9215, p. 23-42

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  13. 2014
  14. eavesROP: Listening for ROP Payloads in Data Streams

    Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell 2014 Information Security/Lecture Notes in Computer Science. Chow, S. S. M., Camenisch, J., Hui, L. C. K. & Yiu, S. M. (eds.). Springer, Vol. 8783, p. 413-424 (Lecture Notes in Computer Science; vol. 8783)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  15. eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)

    Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell 2014 (Unpublished) [Publisher information missing].

    Research output: Book/ReportReport

  16. The Efficiency of Optimal Sampling in the Random S-box Model

    Paul Stankovski, Brynielsson, L. & Martin Hell 2014 [Host publication title missing]. IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1712-1716

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  17. 2013
  18. Cryptanalysis of Selected Stream Ciphers

    Paul Stankovski 2013 Department of Electrical and Information Technology, Lund University.

    Research output: ThesisDoctoral Thesis (monograph)

  19. 2012
  20. Analysis of Xorrotation With Application to an HC-128 Variant

    Paul Stankovski, Martin Hell & Thomas Johansson 2012 LNCS. Susilo, W., Mu, Y. & Seberry, J. (eds.). Springer, Vol. 7372, p. 419-425

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  21. An Optimal Sampling Technique for Distinguishing Random S-boxes

    Paul Stankovski & Martin Hell 2012 Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on. Viswanath, P. (ed.). p. 846-850 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  22. Improved distinguishers for HC-128

    Paul Stankovski, Ruj, S., Martin Hell & Thomas Johansson 2012 In : Designs, Codes and Cryptography. 63, 2, p. 225-240

    Research output: Contribution to journalArticle

  23. 2010
  24. Automated algebraic cryptanalysis

    Paul Stankovski 2010 In : Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010. p. 11-11

    Research output: Contribution to journalPublished meeting abstract

  25. Greedy distinguishers and nonrandomness detectors

    Paul Stankovski 2010 Progress in Cryptology - INDOCRYPT 2010 / Lecture Notes in Computer Science. Gong, G. & Gupta, K. C. (eds.). Springer, Vol. 6498, p. 210-226 17 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  26. Laboratory instructions as a cause of student dissonance

    Dey, A., Martin Hell, Rolf, C. C., Paul Stankovski & Ågren, M. 2010 [Host publication title missing]. Andersson, R. & Tempte, L. (eds.). LTH, Lund University, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  27. 2009
  28. An efficient state recovery attack on X-FCSR-256

    Paul Stankovski, Martin Hell & Thomas Johansson 2009 Fast Software Encryption/Lecture Notes in Computer Science. Dunkelman, O. (ed.). Springer, Vol. 5665, p. 23-37

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding