Paul Stankovski Wagner

Senior Lecturer, Associate Professor
More filtering options
  1. 2019
  2. A Key Recovery Reaction Attack on QC-MDPC

    Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, In : IEEE Transactions on Information Theory. 65, 3, p. 1845 - 1861 17 p.

    Research output: Contribution to journalArticle

  3. Guarding the Guards: Accountable Authorities in VANETs

    Joakim Brorsson, Paul Stankovski & Martin Hell, 2019, 2018 IEEE Vehicular Networking Conference (VNC). 4 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  4. 2018
  5. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski, 2018 Jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, p. 273-294 22 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  6. 2017
  7. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski, 2017 Feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer, Vol. 10346 LNCS. p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  9. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 323-346 (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  10. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE - Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  11. 2016
  12. Autonomy in PhD-education – Supervising for Independence

    Mattias Borg, Fredrik Kopsch, Torgny Roxå, Paul Stankovski & Johannes Svensson, 2016 Dec 15, LTHs 9:e Pedagogiska Inspirationskonferens. Andersson, R. & Tempte, L. (eds.). LTH, Lund University, p. 9-13 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  13. A key recovery attack on MDPC with CCA security using decoding errors

    Qian Guo, Thomas Johansson & Paul Stankovski, 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, Vol. 10031 LNCS. p. 789-815 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  14. 2015
  15. Coded-BKW: Solving LWE Using Lattice Codes.

    Qian Guo, Thomas Johansson & Paul Stankovski, 2015, Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (eds.). Springer, Vol. 9215. p. 23-42

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  16. 2014
  17. eavesROP: Listening for ROP Payloads in Data Streams

    Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell, 2014, Information Security/Lecture Notes in Computer Science. Chow, S. S. M., Camenisch, J., Hui, L. C. K. & Yiu, S. M. (eds.). Springer, Vol. 8783. p. 413-424 (Lecture Notes in Computer Science; vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  18. eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)

    Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell, 2014, (Unpublished) [Publisher information missing].

    Research output: Book/ReportReport

  19. The Efficiency of Optimal Sampling in the Random S-box Model

    Paul Stankovski, Brynielsson, L. & Martin Hell, 2014, [Host publication title missing]. IEEE - Institute of Electrical and Electronics Engineers Inc., p. 1712-1716

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  20. 2013
  21. Cryptanalysis of Selected Stream Ciphers

    Paul Stankovski, 2013, Department of Electrical and Information Technology, Lund University.

    Research output: ThesisDoctoral Thesis (monograph)

  22. 2012
  23. Analysis of Xorrotation With Application to an HC-128 Variant

    Paul Stankovski, Martin Hell & Thomas Johansson, 2012, LNCS. Susilo, W., Mu, Y. & Seberry, J. (eds.). Springer, Vol. 7372. p. 419-425

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  24. An Optimal Sampling Technique for Distinguishing Random S-boxes

    Paul Stankovski & Martin Hell, 2012, Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on. Viswanath, P. (ed.). p. 846-850 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  25. Improved distinguishers for HC-128

    Paul Stankovski, Ruj, S., Martin Hell & Thomas Johansson, 2012, In : Designs, Codes and Cryptography. 63, 2, p. 225-240

    Research output: Contribution to journalArticle

  26. 2010
  27. Automated algebraic cryptanalysis

    Paul Stankovski, 2010, In : Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010. p. 11-11

    Research output: Contribution to journalPublished meeting abstract

  28. Greedy distinguishers and nonrandomness detectors

    Paul Stankovski, 2010, Progress in Cryptology - INDOCRYPT 2010 / Lecture Notes in Computer Science. Gong, G. & Gupta, K. C. (eds.). Springer, Vol. 6498. p. 210-226 17 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  29. Laboratory instructions as a cause of student dissonance

    Dey, A., Martin Hell, Rolf, C. C., Paul Stankovski & Ågren, M., 2010, [Host publication title missing]. Andersson, R. & Tempte, L. (eds.). LTH, Lund University, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  30. 2009
  31. An efficient state recovery attack on X-FCSR-256

    Paul Stankovski, Martin Hell & Thomas Johansson, 2009, Fast Software Encryption/Lecture Notes in Computer Science. Dunkelman, O. (ed.). Springer, Vol. 5665. p. 23-37

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding