Thomas Johansson
Professor- 2020
-
A New Decryption Failure Attack Against HQC
Qian Guo & Thomas Johansson, 2020 Dec 6, Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I. Springer, p. 353-382 (Lecture Notes in Computer Science; vol. 12491).Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Making the BKW Algorithm Practical for LWE
Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski Wagner, 2020 Dec, Progress in Cryptology – INDOCRYPT 2020: 21st International Conference on Cryptology in India Bangalore, India, December 13–16, 2020 Proceedings. Springer, p. 417-439 23 p. (Lecture Notes in Computer Science; vol. 12578).Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
Qian Guo, Thomas Johansson & Alexander Nilsson, 2020 Aug 17, Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II. Springer, p. 359-386 (Lecture Notes in Computer Science; vol. 12171).Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
Spectral analysis of ZUC-256
Jing Yang, Thomas Johansson & Alexander Maximov, 2020 May 7, In: IACR Transactions on Symmetric Cryptology. 2020, 1, p. 266-288 23 p.Research output: Contribution to journal › Article
Solving LPN Using Covering Codes
Qian Guo, Thomas Johansson & Carl Löndahl, 2020 Jan, In: Journal of Cryptology. 33, 1, p. 1-33 33 p.Research output: Contribution to journal › Article
An overview of cryptographic primitives for possible use in 5G and beyond
Jing Yang & Thomas Johansson, 2020, In: Science China Information Sciences. 63, 12, 220301.Research output: Contribution to journal › Review article
- 2019
-
A novel CCA attack using decryption errors against LAC
Qian Guo, Thomas Johansson & Jing Yang, 2019 Nov 25, Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, 2019, Proceedings, Part I. Galbraith, S. D. & Moriai, S. (eds.). Springer Gabler, p. 82-111 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11921 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
A Key Recovery Reaction Attack on QC-MDPC
Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, In: IEEE Transactions on Information Theory. 65, 3, p. 1845 - 1861 17 p.Research output: Contribution to journal › Article
-
An AEAD Variant of the Grain Stream Cipher
Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup & Hirotaka Yoshida, 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (eds.). Springer Nature Switzerland AG, p. 55-71 17 p.Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
A new birthday-type algorithm for attacking the fresh re-keying countermeasure
Qian Guo & Thomas Johansson, 2019, In: Information Processing Letters. 146, p. 30-34 5 p.Research output: Contribution to journal › Article
A new SNOW stream cipher called SNOW-V
Patrik Ekdahl, Thomas Johansson, Alexander Maximov & Jing Yang, 2019, In: IACR Transactions on Symmetric Cryptology. 2019, 3, p. 1-42 42 p.Research output: Contribution to journal › Article
-
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes
J. D'Anvers, Qian Guo, Thomas Johansson, Alexander Nilsson, F. Vercauteren & I. Verbauwhede, 2019, Public-Key Cryptography – PKC 2019. Springer, p. 565-598 (Lecture Notes in Computer Science; vol. 11443).Research output: Chapter in Book/Report/Conference proceeding › Book chapter
Improved Decoders for p-ary MDPC
Isaac Canales-Martinez, Qian Guo & Thomas Johansson, 2019. 11 p.Research output: Contribution to conference › Paper, not in proceeding
-
Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem
Irina E. Bocharova, Thomas Johansson & Boris D. Kudryashov, 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2019-July. p. 1882-1886 5 p. 8849839Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
Vectorized linear approximations for attacks on SNOW 3G
Jing Yang, Thomas Johansson & Alexander Maximov, 2019, Fast Software Encryption conference. p. 249-271 ( IACR Transactions on Symmetric Cryptology; vol. 2019, no. 4).Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2018
-
Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol
Jean Christophe Deneuville, Philippe Gaborit, Qian Guo & Thomas Johansson, 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 1450-1454 5 p. 8437940Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Editorial: Special issue on coding and cryptography
Pascale Charpin, Thomas Johansson, Gohar Kyureghyan, Nicolas Sendrier & Jean Pierre Tillich, 2017 Jan, In: Designs, Codes, and Cryptography. 82, 1, p. 1-2 2 p.Research output: Contribution to journal › Debate/Note/Editorial
-
A reaction attack on the QC-LDPC mceliece cryptosystem
Tomáš Fabšič, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer, Vol. 10346 LNCS. p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Coded-BKW with Sieving
Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 323-346 (Lecture Notes in Computer Science; vol. 10624).Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Information Set Decoding with Soft Information and some cryptographic applications
Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE - Institute of Electrical and Electronics Engineers Inc., p. 1793-1797Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
Carl Löndahl, Thomas Johansson, Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari & Mohammad Reza Aref, 2016 Aug 1, In: Designs, Codes, and Cryptography. 80, 2, p. 359-377 19 p.Research output: Contribution to journal › Article
-
A p-ary MDPC scheme.
Qian Guo & Thomas Johansson, 2016 Jul 10, IEEE International Symposium on Information Theory, ISIT 2016.. Barcelona, Spain.: IEEE - Institute of Electrical and Electronics Engineers Inc., p. 1356-1360 5 p.Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes
Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari, Thomas Johansson & Mohammad Reza Aref, 2016 Jul 1, In: IET Information Security. 10, 4, p. 194-202 9 p.Research output: Contribution to journal › Article
-
A key recovery attack on MDPC with CCA security using decoding errors
Qian Guo, Thomas Johansson & Paul Stankovski, 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, Vol. 10031 LNCS. p. 789-815 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2015
A generalized birthday approach for efficiently finding linear relations in l-sequences
Hui Wang, Paul Stankovski & Thomas Johansson, 2015, In: Designs, Codes and Cryptography. 74, 1, p. 41-57Research output: Contribution to journal › Article
-
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial
Qian Guo, Thomas Johansson & Carl Löndahl, 2015, In: IEEE Transactions on Information Theory. 61, 11, p. 6204-6212Research output: Contribution to journal › Article
-
Coded-BKW: Solving LWE Using Lattice Codes.
Qian Guo, Thomas Johansson & Paul Stankovski, 2015, Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (eds.). Springer, Vol. 9215. p. 23-42Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications
Carl Löndahl & Thomas Johansson, 2014, In: Designs, Codes and Cryptography. 73, 2, p. 625-640Research output: Contribution to journal › Article
-
Solving LPN Using Covering Codes
Qian Guo, Thomas Johansson & Carl Löndahl, 2014, Advances in Cryptology - Asiacrypt 2014. Iwata, T. & Sarkar, P. (eds.). Springer, Vol. 8873. p. 1-20Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2013
-
Advances in Cryptology -- EUROCRYPT 2013
Thomas Johansson (ed.) & Nguyen Phong Q. (ed.), 2013, [Publisher information missing].Research output: Book/Report › Anthology (editor)
-
A new algorithm for finding low-weight polynomial multiples and its application to TCHo
Thomas Johansson & Carl Löndahl, 2013, Preproceedings The International Workshop on Coding and Cryptography WCC 2013. Budaghyan, L., Helleseth, T. & Parker, M. G. (eds.). The Selmer Center at the University of Bergen, 12 p.Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Improved Key Recovery Attack on the BEAN Stream Cipher
Hui Wang, Martin Hell, Thomas Johansson & Martin Ågren, 2013, In: IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E96A, 6, p. 1437-1444Research output: Contribution to journal › Article
- 2012
-
Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques
David Pointcheval (ed.) & Thomas Johansson (ed.), 2012, Springer. (Lecture Notes in Computer Science; vol. 7237)Research output: Book/Report › Anthology (editor)
Analysis of Xorrotation With Application to an HC-128 Variant
Paul Stankovski, Martin Hell & Thomas Johansson, 2012, LNCS. Susilo, W., Mu, Y. & Seberry, J. (eds.). Springer, Vol. 7372. p. 419-425Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
A new version of McEliece PKC based on convolutional codes
Carl Löndahl & Thomas Johansson, 2012, Information and Communications Security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Springer, p. 461-470 10 p. (Lecture Notes in Computer Science; vol. 7618).Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
A Survey on Fast Correlation Attacks
Martin Ågren, Carl Löndahl, Martin Hell & Thomas Johansson, 2012, In: Cryptography and Communications. 4, 3-4, p. 173-202Research output: Contribution to journal › Review article
Improved distinguishers for HC-128
Paul Stankovski, Sushmita Ruj, Martin Hell & Thomas Johansson, 2012, In: Designs, Codes and Cryptography. 63, 2, p. 225-240Research output: Contribution to journal › Article
-
Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials
Martin Hell, Thomas Johansson, Lennart Brynielsson & Håkan Englund, 2012, In: IEEE Transactions on Information Theory. 58, 9, p. 6183-6193Research output: Contribution to journal › Article
-
Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers
Martin Ågren, Martin Hell, Thomas Johansson & Carl Löndahl, 2012, 7th International Symposium onTurbo Codes and Iterative Information Processing (ISTC), 2012. IEEE - Institute of Electrical and Electronics Engineers Inc., p. 260-264Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
On Hardware-Oriented Message Authentication
Martin Ågren, Martin Hell & Thomas Johansson, 2012, In: IET Information Security. 6, 4, p. 329-336Research output: Contribution to journal › Article
-
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
Martucci Leonardo A, Zuccato Albin, Ben Smeets, Habib Sheikh M., Thomas Johansson & Shahmehri Nahid, 2012, [Host publication title missing]. IEEE - Institute of Electrical and Electronics Engineers Inc., 6 p.Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Some results on fast algebraic attacks and higher-order non-linearities
Q. Wang, Thomas Johansson & H. Kan, 2012, In: IET Information Security. 6, 1, p. 41-46Research output: Contribution to journal › Article
- 2011
A New Version of Grain-128 with Authentication
Martin Ågren, Martin Hell, Thomas Johansson & Willi Meier, 2011. 19 p.Research output: Contribution to conference › Paper, not in proceeding
An improvement to Stern's algorithm
Thomas Johansson & Carl Löndahl, 2011, (Unpublished) [Publisher information missing].Research output: Book/Report › Report
-
A note on fast algebraic attacks and higher order nonlinearities
Qichun Wang & Thomas Johansson, 2011, Information Security and Cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Springer, p. 404-414 (Lecture Notes in Computer Science; vol. 6584).Research output: Chapter in Book/Report/Conference proceeding › Book chapter
-
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
Martin Hell & Thomas Johansson, 2011, In: Journal of Cryptology. 24, 3, p. 427-445Research output: Contribution to journal › Article