Thomas Johansson

Professor
Fler filtreringsmöjligheter
  1. 2017
  2. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P. 2017 jan I : Designs, Codes, and Cryptography. 82, 1, s. 1-2 2 s.

    Forskningsoutput: TidskriftsbidragDebate/Note/Editorial

  3. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson 2017 Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer Verlag, Vol. 10346 LNCS, s. 51-68 18 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS)

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  4. Coded-BKW with Sieving: An Improved Algorithm for Solving the LWE Problem

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski 2017 Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, s. 323-346 (Lecture Notes in Computer Science; vol. 10624)

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  5. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski 2017 IEEE International Symposium on Information Theory (ISIT). IEEE--Institute of Electrical and Electronics Engineers Inc., s. 1793-1797

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  6. 2016
  7. Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension

    Löndahl, C., Thomas Johansson, Koochak Shooshtari, M., Ahmadian-Attari, M. & Aref, M. R. 2016 aug 1 I : Designs, Codes, and Cryptography. 80, 2, s. 359-377 19 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  8. A p-ary MDPC scheme.

    Qian Guo & Thomas Johansson 2016 jul 10 IEEE International Symposium on Information Theory, ISIT 2016.. Barcelona, Spain.: IEEE--Institute of Electrical and Electronics Engineers Inc., s. 1356-1360 5 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  9. Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes

    Koochak Shooshtari, M., Ahmadian-Attari, M., Thomas Johansson & Aref, M. R. 2016 jul 1 I : IET Information Security. 10, 4, s. 194-202 9 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  10. A key recovery attack on MDPC with CCA security using decoding errors

    Qian Guo, Thomas Johansson & Paul Stankovski 2016 Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, Vol. 10031 LNCS, s. 789-815 27 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS)

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  11. 2015
  12. A generalized birthday approach for efficiently finding linear relations in l-sequences

    Wang, H., Paul Stankovski & Thomas Johansson 2015 I : Designs, Codes and Cryptography. 74, 1, s. 41-57

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  13. A New Algorithm for Solving Ring-LPN With a Reducible Polynomial

    Qian Guo, Thomas Johansson & Löndahl, C. 2015 I : IEEE Transactions on Information Theory. 61, 11, s. 6204-6212

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  14. Coded-BKW: Solving LWE Using Lattice Codes.

    Qian Guo, Thomas Johansson & Paul Stankovski 2015 Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (red.). Springer, Vol. 9215, s. 23-42

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  15. 2014
  16. An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers

    Paul Stankovski, Martin Hell & Thomas Johansson 2014 I : Journal of Cryptology. 27, 1, s. 1-22

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  17. Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications

    Löndahl, C. & Thomas Johansson 2014 I : Designs, Codes and Cryptography. 73, 2, s. 625-640

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  18. Solving LPN Using Covering Codes

    Qian Guo, Thomas Johansson & Löndahl, C. 2014 Advances in Cryptology - Asiacrypt 2014. Iwata, T. & Sarkar, P. (red.). Springer, Vol. 8873, s. 1-20

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  19. 2013
  20. Advances in Cryptology -- EUROCRYPT 2013

    Thomas Johansson (red.) & Phong Q., N. (red.) 2013 [Publisher information missing].

    Forskningsoutput: Bok/rapportAntologi (redaktör)

  21. A new algorithm for finding low-weight polynomial multiples and its application to TCHo

    Thomas Johansson & Löndahl, C. 2013 Preproceedings The International Workshop on Coding and Cryptography WCC 2013. Budaghyan, L., Helleseth, T. & Parker, M. G. (red.). The Selmer Center at the University of Bergen, 12 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  22. Improved Key Recovery Attack on the BEAN Stream Cipher

    Wang, H., Martin Hell, Thomas Johansson & Ågren, M. 2013 I : IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E96A, 6, s. 1437-1444

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  23. 2012
  24. Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques

    Pointcheval, D. (red.) & Thomas Johansson (red.) 2012 Springer. (Lecture Notes in Computer Science; vol. 7237)

    Forskningsoutput: Bok/rapportAntologi (redaktör)

  25. Analysis of Xorrotation With Application to an HC-128 Variant

    Paul Stankovski, Martin Hell & Thomas Johansson 2012 LNCS. Susilo, W., Mu, Y. & Seberry, J. (red.). Springer, Vol. 7372, s. 419-425

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  26. A new version of McEliece PKC based on convolutional codes

    Löndahl, C. & Thomas Johansson 2012 (Accepted/In press) LNCS. Springer, 10 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  27. A Survey on Fast Correlation Attacks

    Ågren, M., Löndahl, C., Martin Hell & Thomas Johansson 2012 I : Cryptography and Communications. 4, 3-4, s. 173-202

    Forskningsoutput: TidskriftsbidragÖversiktsartikel

  28. Improved distinguishers for HC-128

    Paul Stankovski, Ruj, S., Martin Hell & Thomas Johansson 2012 I : Designs, Codes and Cryptography. 63, 2, s. 225-240

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  29. Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials

    Martin Hell, Thomas Johansson, Brynielsson, L. & Englund, H. 2012 I : IEEE Transactions on Information Theory. 58, 9, s. 6183-6193

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  30. Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers

    Ågren, M., Martin Hell, Thomas Johansson & Löndahl, C. 2012 7th International Symposium onTurbo Codes and Iterative Information Processing (ISTC), 2012. IEEE--Institute of Electrical and Electronics Engineers Inc., s. 260-264

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  31. On Hardware-Oriented Message Authentication

    Ågren, M., Martin Hell & Thomas Johansson 2012 I : IET Information Security. 6, 4, s. 329-336

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  32. Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry

    Leonardo A, M., Albin, Z., Ben Smeets, Sheikh M., H., Thomas Johansson & Nahid, S. 2012 [Host publication title missing]. IEEE--Institute of Electrical and Electronics Engineers Inc., 6 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  33. Some results on fast algebraic attacks and higher-order non-linearities

    Wang, Q., Thomas Johansson & Kan, H. 2012 I : IET Information Security. 6, 1, s. 41-46

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  34. 2011
  35. A New Version of Grain-128 with Authentication

    Ågren, M., Martin Hell, Thomas Johansson & Meier, W. 2011 19 s.

    Forskningsoutput: KonferensbidragKonferenspaper, ej i proceeding/ej förlagsutgivet

  36. An improvement to Stern's algorithm

    Thomas Johansson & Löndahl, C. 2011 [Publisher information missing].

    Forskningsoutput: Bok/rapportRapport

  37. A note on fast algebraic attacks and higher order nonlinearities

    Wang, Q. & Thomas Johansson 2011 (Accepted/In press) Lecture Notes in Computer Science.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  38. Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time

    Martin Hell & Thomas Johansson 2011 I : Journal of Cryptology. 24, 3, s. 427-445

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  39. Evaluation of Some Algorithms for Hardware-Oriented Message Authentication

    Ågren, M., Martin Hell & Thomas Johansson 2011 [Publisher information missing]. 9 s.

    Forskningsoutput: Bok/rapportRapport

  40. Grain-128a: a new version of Grain-128 with optional authentication

    Ågren, M., Martin Hell, Thomas Johansson & Meier, W. 2011 I : International Journal of Wireless and Mobile Computing. 5, 1, s. 48-59

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  41. Linear Attacks on Stream Ciphers

    Martin Hell & Thomas Johansson 2011 Advanced Linear Cryptanalysis of Block and Stream Ciphers/Cryptology and Information Security Series. IOS Press, s. 55-85

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKapitel samlingsverk

  42. On equivalence classes of Boolean functions

    Wang, Q. & Thomas Johansson 2011 (Accepted/In press) Lecture Notes in Computer Science.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  43. On Hardware-Oriented Message Authentication with Applications Towards RFID

    Ågren, M., Martin Hell & Thomas Johansson 2011 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications. Kellenberger, P. (red.). IEEE--Institute of Electrical and Electronics Engineers Inc., s. 26-33 8 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  44. 2010
  45. Security Evaluation of Stream Cipher Enocoro-128v2

    Martin Hell & Thomas Johansson 2010 CRYPTREC Technical Report. 31 s.

    Forskningsoutput: Bok/rapportRapport

  46. 2009
  47. An efficient state recovery attack on X-FCSR-256

    Paul Stankovski, Martin Hell & Thomas Johansson 2009 Fast Software Encryption/Lecture Notes in Computer Science. Dunkelman, O. (red.). Springer, Vol. 5665, s. 23-37

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  48. An overview of distinguishing attacks on stream ciphers

    Martin Hell, Thomas Johansson & Brynielsson, L. 2009 I : Cryptography and Communications. 1, 1, s. 71-94

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  49. Control of a turbo charged NVO HCCI engine using a model based approach

    Aulin, H., Thomas Johansson, Per Tunestål & Johansson, B. 2009 2009 IFAC Workshop on Engine and Powertrain Control, Simulation and Modeling, E-COSM'09 - Final Report. 26 red. Vol. 42, s. 79-86 8 s. (IFAC Proceedings Volumes)

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  50. Improving the rainbow attack by reusing colours

    Ågren, M., Thomas Johansson & Martin Hell 2009 Cryptology and Network Security/Lecture Notes in Computer Science. Garay, J. A., Miyaji, A. & Otsuka, A. (red.). Springer, Vol. 5888, s. 362-378

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  51. Thermodynamic modeling and control of a negative valve overlap turbo HCCI engine

    Aulin, H., Thomas Johansson, Per Tunestål & Johansson, B. 2009 Proceedings of the 11th IASTED International Conference on Control and Applications, CA 2009. s. 286-293 8 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  52. 2008
  53. Breaking the F-FCSR-H stream cipher in real time

    Martin Hell & Thomas Johansson 2008 Advances in Cryptology / Lecture Notes in Computer Science. Pieprzyk, J. (red.). Springer, Vol. 5350, s. 557-569

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  54. One-sweep APP decoding algorithm for binary block codes with reduced trellis memory

    Thomas Johansson & Trofimov, A. 2008 Proceedings of coding theory days in St.Petersburg. s. 88-93

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  55. The Grain family of stream ciphers

    Martin Hell, Thomas Johansson, Maximov, A. & Meier, W. 2008 New Stream Cipher Designs - The eSTREAM Finalists. Robshaw, M. & Billet, O. (red.). Springer, s. 179-190

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKapitel samlingsverk

  56. 2007
  57. A framework for chosen IV statistical analysis of stream ciphers

    Englund, H., Thomas Johansson & Sönmez Turan, M. 2007 Progress in Cryptology / Lecture Notes in Computer Science. Springer, Vol. 4859, s. 268-281

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  58. A key recovery attack on Edon80

    Martin Hell & Thomas Johansson 2007 Advances in Cryptology / Lecture Notes in Computer Science. Kurosawa, K. (red.). Springer, Vol. 4833, s. 568-581

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  59. A linear distinguishing attack on SCREAM

    Thomas Johansson & Maximov, A. 2007 I : IEEE Transactions on Information Theory. 53, 9, s. 3127-3144

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  60. A note on distinguishing attacks

    Englund, H., Martin Hell & Thomas Johansson 2007 [Host publication title missing]. IEEE--Institute of Electrical and Electronics Engineers Inc., s. 87-90

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  61. Cryptanalysis of Achterbahn-128/80

    Martin Hell & Thomas Johansson 2007 I : IET Information Security. 1, 2, s. 47-52

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

Föregående 1 2 3 Nästa