Thomas JohanssonProfessor
More filtering options
  1. 2017
  2. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P. 2017 Jan In : Designs, Codes, and Cryptography. 82, 1, p. 1-2 2 p.

    Research output: Contribution to journalDebate/Note/Editorial

  3. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson 2017 Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer Verlag, Vol. 10346 LNCS, p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  4. Coded-BKW with Sieving: An Improved Algorithm for Solving the LWE Problem

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski 2017 Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 323-346 (Lecture Notes in Computer Science; vol. 10624)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski 2017 IEEE International Symposium on Information Theory (ISIT). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  6. 2016
  7. Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension

    Löndahl, C., Thomas Johansson, Koochak Shooshtari, M., Ahmadian-Attari, M. & Aref, M. R. 2016 Aug 1 In : Designs, Codes, and Cryptography. 80, 2, p. 359-377 19 p.

    Research output: Contribution to journalArticle

  8. A p-ary MDPC scheme.

    Qian Guo & Thomas Johansson 2016 Jul 10 IEEE International Symposium on Information Theory, ISIT 2016.. Barcelona, Spain.: IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1356-1360 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  9. Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes

    Koochak Shooshtari, M., Ahmadian-Attari, M., Thomas Johansson & Aref, M. R. 2016 Jul 1 In : IET Information Security. 10, 4, p. 194-202 9 p.

    Research output: Contribution to journalArticle

  10. A key recovery attack on MDPC with CCA security using decoding errors

    Qian Guo, Thomas Johansson & Paul Stankovski 2016 Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, Vol. 10031 LNCS, p. 789-815 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  11. 2015
  12. A New Algorithm for Solving Ring-LPN With a Reducible Polynomial

    Qian Guo, Thomas Johansson & Löndahl, C. 2015 In : IEEE Transactions on Information Theory. 61, 11, p. 6204-6212

    Research output: Contribution to journalArticle

  13. Coded-BKW: Solving LWE Using Lattice Codes.

    Qian Guo, Thomas Johansson & Paul Stankovski 2015 Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (eds.). Springer, Vol. 9215, p. 23-42

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  14. 2014
  15. Solving LPN Using Covering Codes

    Qian Guo, Thomas Johansson & Löndahl, C. 2014 Advances in Cryptology - Asiacrypt 2014. Iwata, T. & Sarkar, P. (eds.). Springer, Vol. 8873, p. 1-20

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  16. 2013
  17. Advances in Cryptology -- EUROCRYPT 2013

    Thomas Johansson (ed.) & Phong Q., N. (ed.) 2013 [Publisher information missing].

    Research output: Book/ReportAnthology (editor)

  18. A new algorithm for finding low-weight polynomial multiples and its application to TCHo

    Thomas Johansson & Löndahl, C. 2013 Preproceedings The International Workshop on Coding and Cryptography WCC 2013. Budaghyan, L., Helleseth, T. & Parker, M. G. (eds.). The Selmer Center at the University of Bergen, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  19. 2012
  20. Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques

    Pointcheval, D. (ed.) & Thomas Johansson (ed.) 2012 Springer. (Lecture Notes in Computer Science; vol. 7237)

    Research output: Book/ReportAnthology (editor)

  21. Analysis of Xorrotation With Application to an HC-128 Variant

    Paul Stankovski, Martin Hell & Thomas Johansson 2012 LNCS. Susilo, W., Mu, Y. & Seberry, J. (eds.). Springer, Vol. 7372, p. 419-425

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  22. A new version of McEliece PKC based on convolutional codes

    Löndahl, C. & Thomas Johansson 2012 (Accepted/In press) LNCS. Springer, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  23. A Survey on Fast Correlation Attacks

    Ågren, M., Löndahl, C., Martin Hell & Thomas Johansson 2012 In : Cryptography and Communications. 4, 3-4, p. 173-202

    Research output: Contribution to journalReview article

  24. Improved distinguishers for HC-128

    Paul Stankovski, Ruj, S., Martin Hell & Thomas Johansson 2012 In : Designs, Codes and Cryptography. 63, 2, p. 225-240

    Research output: Contribution to journalArticle

  25. Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials

    Martin Hell, Thomas Johansson, Brynielsson, L. & Englund, H. 2012 In : IEEE Transactions on Information Theory. 58, 9, p. 6183-6193

    Research output: Contribution to journalArticle

  26. Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers

    Ågren, M., Martin Hell, Thomas Johansson & Löndahl, C. 2012 7th International Symposium onTurbo Codes and Iterative Information Processing (ISTC), 2012. IEEE--Institute of Electrical and Electronics Engineers Inc., p. 260-264

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  27. On Hardware-Oriented Message Authentication

    Ågren, M., Martin Hell & Thomas Johansson 2012 In : IET Information Security. 6, 4, p. 329-336

    Research output: Contribution to journalArticle

  28. Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry

    Leonardo A, M., Albin, Z., Ben Smeets, Sheikh M., H., Thomas Johansson & Nahid, S. 2012 [Host publication title missing]. IEEE--Institute of Electrical and Electronics Engineers Inc., 6 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  29. Some results on fast algebraic attacks and higher-order non-linearities

    Wang, Q., Thomas Johansson & Kan, H. 2012 In : IET Information Security. 6, 1, p. 41-46

    Research output: Contribution to journalArticle

  30. 2011
  31. A New Version of Grain-128 with Authentication

    Ågren, M., Martin Hell, Thomas Johansson & Meier, W. 2011 19 p.

    Research output: Contribution to conferencePaper, not in proceeding

  32. An improvement to Stern's algorithm

    Thomas Johansson & Löndahl, C. 2011 (Unpublished) [Publisher information missing].

    Research output: Book/ReportReport

  33. A note on fast algebraic attacks and higher order nonlinearities

    Wang, Q. & Thomas Johansson 2011 (Accepted/In press) Lecture Notes in Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  34. Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time

    Martin Hell & Thomas Johansson 2011 In : Journal of Cryptology. 24, 3, p. 427-445

    Research output: Contribution to journalArticle

  35. Evaluation of Some Algorithms for Hardware-Oriented Message Authentication

    Ågren, M., Martin Hell & Thomas Johansson 2011 [Publisher information missing]. 9 p.

    Research output: Book/ReportReport

  36. Grain-128a: a new version of Grain-128 with optional authentication

    Ågren, M., Martin Hell, Thomas Johansson & Meier, W. 2011 In : International Journal of Wireless and Mobile Computing. 5, 1, p. 48-59

    Research output: Contribution to journalArticle

  37. Linear Attacks on Stream Ciphers

    Martin Hell & Thomas Johansson 2011 Advanced Linear Cryptanalysis of Block and Stream Ciphers/Cryptology and Information Security Series. IOS Press, p. 55-85

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  38. On equivalence classes of Boolean functions

    Wang, Q. & Thomas Johansson 2011 (Accepted/In press) Lecture Notes in Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  39. On Hardware-Oriented Message Authentication with Applications Towards RFID

    Ågren, M., Martin Hell & Thomas Johansson 2011 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications. Kellenberger, P. (ed.). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 26-33 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  40. 2010
  41. Security Evaluation of Stream Cipher Enocoro-128v2

    Martin Hell & Thomas Johansson 2010 CRYPTREC Technical Report. 31 p.

    Research output: Book/ReportReport

  42. 2009
  43. An efficient state recovery attack on X-FCSR-256

    Paul Stankovski, Martin Hell & Thomas Johansson 2009 Fast Software Encryption/Lecture Notes in Computer Science. Dunkelman, O. (ed.). Springer, Vol. 5665, p. 23-37

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  44. An overview of distinguishing attacks on stream ciphers

    Martin Hell, Thomas Johansson & Brynielsson, L. 2009 In : Cryptography and Communications. 1, 1, p. 71-94

    Research output: Contribution to journalArticle

  45. Control of a turbo charged NVO HCCI engine using a model based approach

    Aulin, H., Thomas Johansson, Per Tunestål & Johansson, B. 2009 2009 IFAC Workshop on Engine and Powertrain Control, Simulation and Modeling, E-COSM'09 - Final Report. 26 ed. Vol. 42, p. 79-86 8 p. (IFAC Proceedings Volumes)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  46. Improving the rainbow attack by reusing colours

    Ågren, M., Thomas Johansson & Martin Hell 2009 Cryptology and Network Security/Lecture Notes in Computer Science. Garay, J. A., Miyaji, A. & Otsuka, A. (eds.). Springer, Vol. 5888, p. 362-378

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  47. Thermodynamic modeling and control of a negative valve overlap turbo HCCI engine

    Aulin, H., Thomas Johansson, Per Tunestål & Johansson, B. 2009 Proceedings of the 11th IASTED International Conference on Control and Applications, CA 2009. p. 286-293 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  48. 2008
  49. Breaking the F-FCSR-H stream cipher in real time

    Martin Hell & Thomas Johansson 2008 Advances in Cryptology / Lecture Notes in Computer Science. Pieprzyk, J. (ed.). Springer, Vol. 5350, p. 557-569

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  50. One-sweep APP decoding algorithm for binary block codes with reduced trellis memory

    Thomas Johansson & Trofimov, A. 2008 Proceedings of coding theory days in St.Petersburg. p. 88-93

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  51. The Grain family of stream ciphers

    Martin Hell, Thomas Johansson, Maximov, A. & Meier, W. 2008 New Stream Cipher Designs - The eSTREAM Finalists. Robshaw, M. & Billet, O. (eds.). Springer, p. 179-190

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  52. 2007
  53. A framework for chosen IV statistical analysis of stream ciphers

    Englund, H., Thomas Johansson & Sönmez Turan, M. 2007 Progress in Cryptology / Lecture Notes in Computer Science. Springer, Vol. 4859, p. 268-281

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  54. A key recovery attack on Edon80

    Martin Hell & Thomas Johansson 2007 Advances in Cryptology / Lecture Notes in Computer Science. Kurosawa, K. (ed.). Springer, Vol. 4833, p. 568-581

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  55. A linear distinguishing attack on SCREAM

    Thomas Johansson & Maximov, A. 2007 In : IEEE Transactions on Information Theory. 53, 9, p. 3127-3144

    Research output: Contribution to journalArticle

  56. A note on distinguishing attacks

    Englund, H., Martin Hell & Thomas Johansson 2007 [Host publication title missing]. IEEE--Institute of Electrical and Electronics Engineers Inc., p. 87-90

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  57. Cryptanalysis of Achterbahn-128/80

    Martin Hell & Thomas Johansson 2007 In : IET Information Security. 1, 2, p. 47-52

    Research output: Contribution to journalArticle

Previous 1 2 3 Next