• Visiting address

    Sweden

Filter
Book chapter

Search results

  • 2023

    Correlation Attacks on Stream Ciphers

    Johansson, T., 2023 Dec 1, Symmetric Cryptography 2: Cryptanalysis and Future Directions. Wiley, p. 143-154

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • 2022

    Secure Ownership Transfer for Resource Constrained IoT Infrastructures

    Gunnarsson, M. & Gehrmann, C., 2022, Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Revised Selected Papers. Furnell, S., Mori, P., Weippl, E. & Camp, O. (eds.). Springer Science and Business Media B.V., p. 22-47 26 p. (Communications in Computer and Information Science; vol. 1545 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • 2019

    Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes

    D'Anvers, J., Guo, Q., Johansson, T., Nilsson, A., Vercauteren, F. & Verbauwhede, I., 2019, Public-Key Cryptography – PKC 2019. Springer, p. 565-598 (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • 2011

    Network optimization techniques

    Pioro, M., 2011, Mathematical Foundations for Signal Processing, Communications, and Networking. Serpedin, E., Chen, T. & Rajan, D. (eds.). CRC Press, p. 627-690

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review