Thomas Johansson

Professor
More filtering options
  1. 2018
  2. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol

    Deneuville, J. C., Gaborit, P., Qian Guo & Thomas Johansson, 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June, p. 1450-1454 5 p. 8437940

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  3. 2017
  4. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P., 2017 Jan, In : Designs, Codes, and Cryptography. 82, 1, p. 1-2 2 p.

    Research output: Contribution to journalDebate/Note/Editorial

  5. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer Verlag, Vol. 10346 LNCS, p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  6. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 323-346 (Lecture Notes in Computer Science; vol. 10624)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  7. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. 2016
  9. Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension

    Löndahl, C., Thomas Johansson, Koochak Shooshtari, M., Ahmadian-Attari, M. & Aref, M. R., 2016 Aug 1, In : Designs, Codes, and Cryptography. 80, 2, p. 359-377 19 p.

    Research output: Contribution to journalArticle

  10. A p-ary MDPC scheme.

    Qian Guo & Thomas Johansson, 2016 Jul 10, IEEE International Symposium on Information Theory, ISIT 2016.. Barcelona, Spain.: IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1356-1360 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  11. Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes

    Koochak Shooshtari, M., Ahmadian-Attari, M., Thomas Johansson & Aref, M. R., 2016 Jul 1, In : IET Information Security. 10, 4, p. 194-202 9 p.

    Research output: Contribution to journalArticle

  12. A key recovery attack on MDPC with CCA security using decoding errors

    Qian Guo, Thomas Johansson & Paul Stankovski, 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, Vol. 10031 LNCS, p. 789-815 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  13. 2015
  14. A New Algorithm for Solving Ring-LPN With a Reducible Polynomial

    Qian Guo, Thomas Johansson & Löndahl, C., 2015, In : IEEE Transactions on Information Theory. 61, 11, p. 6204-6212

    Research output: Contribution to journalArticle

  15. Coded-BKW: Solving LWE Using Lattice Codes.

    Qian Guo, Thomas Johansson & Paul Stankovski, 2015, Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (eds.). Springer, Vol. 9215, p. 23-42

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  16. 2014
  17. Solving LPN Using Covering Codes

    Qian Guo, Thomas Johansson & Löndahl, C., 2014, Advances in Cryptology - Asiacrypt 2014. Iwata, T. & Sarkar, P. (eds.). Springer, Vol. 8873, p. 1-20

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  18. 2013
  19. Advances in Cryptology -- EUROCRYPT 2013

    Thomas Johansson (ed.) & Phong Q., N. (ed.), 2013, [Publisher information missing].

    Research output: Book/ReportAnthology (editor)

  20. A new algorithm for finding low-weight polynomial multiples and its application to TCHo

    Thomas Johansson & Löndahl, C., 2013, Preproceedings The International Workshop on Coding and Cryptography WCC 2013. Budaghyan, L., Helleseth, T. & Parker, M. G. (eds.). The Selmer Center at the University of Bergen, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  21. Improved Key Recovery Attack on the BEAN Stream Cipher

    Wang, H., Martin Hell, Thomas Johansson & Ågren, M., 2013, In : IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E96A, 6, p. 1437-1444

    Research output: Contribution to journalArticle

  22. 2012
  23. Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques

    Pointcheval, D. (ed.) & Thomas Johansson (ed.), 2012, Springer. (Lecture Notes in Computer Science; vol. 7237)

    Research output: Book/ReportAnthology (editor)

  24. Analysis of Xorrotation With Application to an HC-128 Variant

    Paul Stankovski, Martin Hell & Thomas Johansson, 2012, LNCS. Susilo, W., Mu, Y. & Seberry, J. (eds.). Springer, Vol. 7372, p. 419-425

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  25. A new version of McEliece PKC based on convolutional codes

    Löndahl, C. & Thomas Johansson, 2012, (Accepted/In press) LNCS. Springer, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  26. A Survey on Fast Correlation Attacks

    Ågren, M., Löndahl, C., Martin Hell & Thomas Johansson, 2012, In : Cryptography and Communications. 4, 3-4, p. 173-202

    Research output: Contribution to journalReview article

  27. Improved distinguishers for HC-128

    Paul Stankovski, Ruj, S., Martin Hell & Thomas Johansson, 2012, In : Designs, Codes and Cryptography. 63, 2, p. 225-240

    Research output: Contribution to journalArticle

  28. Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials

    Martin Hell, Thomas Johansson, Brynielsson, L. & Englund, H., 2012, In : IEEE Transactions on Information Theory. 58, 9, p. 6183-6193

    Research output: Contribution to journalArticle

  29. Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers

    Ågren, M., Martin Hell, Thomas Johansson & Löndahl, C., 2012, 7th International Symposium onTurbo Codes and Iterative Information Processing (ISTC), 2012. IEEE--Institute of Electrical and Electronics Engineers Inc., p. 260-264

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  30. On Hardware-Oriented Message Authentication

    Ågren, M., Martin Hell & Thomas Johansson, 2012, In : IET Information Security. 6, 4, p. 329-336

    Research output: Contribution to journalArticle

  31. Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry

    Leonardo A, M., Albin, Z., Ben Smeets, Sheikh M., H., Thomas Johansson & Nahid, S., 2012, [Host publication title missing]. IEEE--Institute of Electrical and Electronics Engineers Inc., 6 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  32. Some results on fast algebraic attacks and higher-order non-linearities

    Wang, Q., Thomas Johansson & Kan, H., 2012, In : IET Information Security. 6, 1, p. 41-46

    Research output: Contribution to journalArticle

  33. 2011
  34. A New Version of Grain-128 with Authentication

    Ågren, M., Martin Hell, Thomas Johansson & Meier, W., 2011 19 p.

    Research output: Contribution to conferencePaper, not in proceeding

  35. An improvement to Stern's algorithm

    Thomas Johansson & Löndahl, C., 2011, (Unpublished) [Publisher information missing].

    Research output: Book/ReportReport

  36. A note on fast algebraic attacks and higher order nonlinearities

    Wang, Q. & Thomas Johansson, 2011, (Accepted/In press) Lecture Notes in Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  37. Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time

    Martin Hell & Thomas Johansson, 2011, In : Journal of Cryptology. 24, 3, p. 427-445

    Research output: Contribution to journalArticle

  38. Evaluation of Some Algorithms for Hardware-Oriented Message Authentication

    Ågren, M., Martin Hell & Thomas Johansson, 2011, [Publisher information missing]. 9 p.

    Research output: Book/ReportReport

  39. Grain-128a: a new version of Grain-128 with optional authentication

    Ågren, M., Martin Hell, Thomas Johansson & Meier, W., 2011, In : International Journal of Wireless and Mobile Computing. 5, 1, p. 48-59

    Research output: Contribution to journalArticle

  40. Linear Attacks on Stream Ciphers

    Martin Hell & Thomas Johansson, 2011, Advanced Linear Cryptanalysis of Block and Stream Ciphers/Cryptology and Information Security Series. IOS Press, p. 55-85

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  41. On equivalence classes of Boolean functions

    Wang, Q. & Thomas Johansson, 2011, (Accepted/In press) Lecture Notes in Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  42. On Hardware-Oriented Message Authentication with Applications Towards RFID

    Ågren, M., Martin Hell & Thomas Johansson, 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications. Kellenberger, P. (ed.). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 26-33 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  43. 2010
  44. Security Evaluation of Stream Cipher Enocoro-128v2

    Martin Hell & Thomas Johansson, 2010, CRYPTREC Technical Report. 31 p.

    Research output: Book/ReportReport

  45. 2009
  46. An efficient state recovery attack on X-FCSR-256

    Paul Stankovski, Martin Hell & Thomas Johansson, 2009, Fast Software Encryption/Lecture Notes in Computer Science. Dunkelman, O. (ed.). Springer, Vol. 5665, p. 23-37

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  47. An overview of distinguishing attacks on stream ciphers

    Martin Hell, Thomas Johansson & Brynielsson, L., 2009, In : Cryptography and Communications. 1, 1, p. 71-94

    Research output: Contribution to journalArticle

  48. Control of a turbo charged NVO HCCI engine using a model based approach

    Aulin, H., Thomas Johansson, Per Tunestål & Johansson, B., 2009, 2009 IFAC Workshop on Engine and Powertrain Control, Simulation and Modeling, E-COSM'09 - Final Report. 26 ed. Vol. 42, p. 79-86 8 p. (IFAC Proceedings Volumes)

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  49. Improving the rainbow attack by reusing colours

    Ågren, M., Thomas Johansson & Martin Hell, 2009, Cryptology and Network Security/Lecture Notes in Computer Science. Garay, J. A., Miyaji, A. & Otsuka, A. (eds.). Springer, Vol. 5888, p. 362-378

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  50. Thermodynamic modeling and control of a negative valve overlap turbo HCCI engine

    Aulin, H., Thomas Johansson, Per Tunestål & Johansson, B., 2009, Proceedings of the 11th IASTED International Conference on Control and Applications, CA 2009. p. 286-293 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  51. 2008
  52. Breaking the F-FCSR-H stream cipher in real time

    Martin Hell & Thomas Johansson, 2008, Advances in Cryptology / Lecture Notes in Computer Science. Pieprzyk, J. (ed.). Springer, Vol. 5350, p. 557-569

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  53. One-sweep APP decoding algorithm for binary block codes with reduced trellis memory

    Thomas Johansson & Trofimov, A., 2008, Proceedings of coding theory days in St.Petersburg. p. 88-93

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  54. The Grain family of stream ciphers

    Martin Hell, Thomas Johansson, Maximov, A. & Meier, W., 2008, New Stream Cipher Designs - The eSTREAM Finalists. Robshaw, M. & Billet, O. (eds.). Springer, p. 179-190

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  55. 2007
  56. A framework for chosen IV statistical analysis of stream ciphers

    Englund, H., Thomas Johansson & Sönmez Turan, M., 2007, Progress in Cryptology / Lecture Notes in Computer Science. Springer, Vol. 4859, p. 268-281

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  57. A key recovery attack on Edon80

    Martin Hell & Thomas Johansson, 2007, Advances in Cryptology / Lecture Notes in Computer Science. Kurosawa, K. (ed.). Springer, Vol. 4833, p. 568-581

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

Previous 1 2 3 Next