Thomas Johansson

Professor
More filtering options
  1. 2020
  2. A New Decryption Failure Attack Against HQC

    Qian Guo & Thomas Johansson, 2020 Dec 6, Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I. Springer, p. 353-382 (Lecture Notes in Computer Science; vol. 12491).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  3. Making the BKW Algorithm Practical for LWE

    Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski Wagner, 2020 Dec, Progress in Cryptology – INDOCRYPT 2020: 21st International Conference on Cryptology in India Bangalore, India, December 13–16, 2020 Proceedings. Springer, p. 417-439 23 p. (Lecture Notes in Computer Science; vol. 12578).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  4. A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM

    Qian Guo, Thomas Johansson & Alexander Nilsson, 2020 Aug 17, Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II. Springer, p. 359-386 (Lecture Notes in Computer Science; vol. 12171).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. Spectral analysis of ZUC-256

    Jing Yang, Thomas Johansson & Alexander Maximov, 2020 May 7, In: IACR Transactions on Symmetric Cryptology. 2020, 1, p. 266-288 23 p.

    Research output: Contribution to journalArticle

  6. Solving LPN Using Covering Codes

    Qian Guo, Thomas Johansson & Carl Löndahl, 2020 Jan, In: Journal of Cryptology. 33, 1, p. 1-33 33 p.

    Research output: Contribution to journalArticle

  7. An overview of cryptographic primitives for possible use in 5G and beyond

    Jing Yang & Thomas Johansson, 2020, In: Science China Information Sciences. 63, 12, 220301.

    Research output: Contribution to journalReview article

  8. 2019
  9. A novel CCA attack using decryption errors against LAC

    Qian Guo, Thomas Johansson & Jing Yang, 2019 Nov 25, Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, 2019, Proceedings, Part I. Galbraith, S. D. & Moriai, S. (eds.). Springer Gabler, p. 82-111 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11921 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  10. A Key Recovery Reaction Attack on QC-MDPC

    Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, In: IEEE Transactions on Information Theory. 65, 3, p. 1845 - 1861 17 p.

    Research output: Contribution to journalArticle

  11. An AEAD Variant of the Grain Stream Cipher

    Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup & Hirotaka Yoshida, 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (eds.). Springer Nature Switzerland AG, p. 55-71 17 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  12. A new SNOW stream cipher called SNOW-V

    Patrik Ekdahl, Thomas Johansson, Alexander Maximov & Jing Yang, 2019, In: IACR Transactions on Symmetric Cryptology. 2019, 3, p. 1-42 42 p.

    Research output: Contribution to journalArticle

  13. Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes

    J. D'Anvers, Qian Guo, Thomas Johansson, Alexander Nilsson, F. Vercauteren & I. Verbauwhede, 2019, Public-Key Cryptography – PKC 2019. Springer, p. 565-598 (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  14. Improved Decoders for p-ary MDPC

    Isaac Canales-Martinez, Qian Guo & Thomas Johansson, 2019. 11 p.

    Research output: Contribution to conferencePaper, not in proceeding

  15. Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem

    Irina E. Bocharova, Thomas Johansson & Boris D. Kudryashov, 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2019-July. p. 1882-1886 5 p. 8849839

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  16. Vectorized linear approximations for attacks on SNOW 3G

    Jing Yang, Thomas Johansson & Alexander Maximov, 2019, Fast Software Encryption conference. p. 249-271 ( IACR Transactions on Symmetric Cryptology; vol. 2019, no. 4).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  17. 2018
  18. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol

    Jean Christophe Deneuville, Philippe Gaborit, Qian Guo & Thomas Johansson, 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 1450-1454 5 p. 8437940

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  19. 2017
  20. Editorial: Special issue on coding and cryptography

    Pascale Charpin, Thomas Johansson, Gohar Kyureghyan, Nicolas Sendrier & Jean Pierre Tillich, 2017 Jan, In: Designs, Codes, and Cryptography. 82, 1, p. 1-2 2 p.

    Research output: Contribution to journalDebate/Note/Editorial

  21. A reaction attack on the QC-LDPC mceliece cryptosystem

    Tomáš Fabšič, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer, Vol. 10346 LNCS. p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  22. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 323-346 (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  23. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE - Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  24. 2016
  25. Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension

    Carl Löndahl, Thomas Johansson, Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari & Mohammad Reza Aref, 2016 Aug 1, In: Designs, Codes, and Cryptography. 80, 2, p. 359-377 19 p.

    Research output: Contribution to journalArticle

  26. A p-ary MDPC scheme.

    Qian Guo & Thomas Johansson, 2016 Jul 10, IEEE International Symposium on Information Theory, ISIT 2016.. Barcelona, Spain.: IEEE - Institute of Electrical and Electronics Engineers Inc., p. 1356-1360 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  27. Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes

    Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari, Thomas Johansson & Mohammad Reza Aref, 2016 Jul 1, In: IET Information Security. 10, 4, p. 194-202 9 p.

    Research output: Contribution to journalArticle

  28. A key recovery attack on MDPC with CCA security using decoding errors

    Qian Guo, Thomas Johansson & Paul Stankovski, 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, Vol. 10031 LNCS. p. 789-815 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  29. 2015
  30. A New Algorithm for Solving Ring-LPN With a Reducible Polynomial

    Qian Guo, Thomas Johansson & Carl Löndahl, 2015, In: IEEE Transactions on Information Theory. 61, 11, p. 6204-6212

    Research output: Contribution to journalArticle

  31. Coded-BKW: Solving LWE Using Lattice Codes.

    Qian Guo, Thomas Johansson & Paul Stankovski, 2015, Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (eds.). Springer, Vol. 9215. p. 23-42

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  32. 2014
  33. Solving LPN Using Covering Codes

    Qian Guo, Thomas Johansson & Carl Löndahl, 2014, Advances in Cryptology - Asiacrypt 2014. Iwata, T. & Sarkar, P. (eds.). Springer, Vol. 8873. p. 1-20

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  34. 2013
  35. Advances in Cryptology -- EUROCRYPT 2013

    Thomas Johansson (ed.) & Nguyen Phong Q. (ed.), 2013, [Publisher information missing].

    Research output: Book/ReportAnthology (editor)

  36. A new algorithm for finding low-weight polynomial multiples and its application to TCHo

    Thomas Johansson & Carl Löndahl, 2013, Preproceedings The International Workshop on Coding and Cryptography WCC 2013. Budaghyan, L., Helleseth, T. & Parker, M. G. (eds.). The Selmer Center at the University of Bergen, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  37. Improved Key Recovery Attack on the BEAN Stream Cipher

    Hui Wang, Martin Hell, Thomas Johansson & Martin Ågren, 2013, In: IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E96A, 6, p. 1437-1444

    Research output: Contribution to journalArticle

  38. 2012
  39. Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques

    David Pointcheval (ed.) & Thomas Johansson (ed.), 2012, Springer. (Lecture Notes in Computer Science; vol. 7237)

    Research output: Book/ReportAnthology (editor)

  40. Analysis of Xorrotation With Application to an HC-128 Variant

    Paul Stankovski, Martin Hell & Thomas Johansson, 2012, LNCS. Susilo, W., Mu, Y. & Seberry, J. (eds.). Springer, Vol. 7372. p. 419-425

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  41. A new version of McEliece PKC based on convolutional codes

    Carl Löndahl & Thomas Johansson, 2012, Information and Communications Security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Springer, p. 461-470 10 p. (Lecture Notes in Computer Science; vol. 7618).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  42. A Survey on Fast Correlation Attacks

    Martin Ågren, Carl Löndahl, Martin Hell & Thomas Johansson, 2012, In: Cryptography and Communications. 4, 3-4, p. 173-202

    Research output: Contribution to journalReview article

  43. Improved distinguishers for HC-128

    Paul Stankovski, Sushmita Ruj, Martin Hell & Thomas Johansson, 2012, In: Designs, Codes and Cryptography. 63, 2, p. 225-240

    Research output: Contribution to journalArticle

  44. Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials

    Martin Hell, Thomas Johansson, Lennart Brynielsson & Håkan Englund, 2012, In: IEEE Transactions on Information Theory. 58, 9, p. 6183-6193

    Research output: Contribution to journalArticle

  45. Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers

    Martin Ågren, Martin Hell, Thomas Johansson & Carl Löndahl, 2012, 7th International Symposium onTurbo Codes and Iterative Information Processing (ISTC), 2012. IEEE - Institute of Electrical and Electronics Engineers Inc., p. 260-264

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  46. On Hardware-Oriented Message Authentication

    Martin Ågren, Martin Hell & Thomas Johansson, 2012, In: IET Information Security. 6, 4, p. 329-336

    Research output: Contribution to journalArticle

  47. Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry

    Martucci Leonardo A, Zuccato Albin, Ben Smeets, Habib Sheikh M., Thomas Johansson & Shahmehri Nahid, 2012, [Host publication title missing]. IEEE - Institute of Electrical and Electronics Engineers Inc., 6 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  48. Some results on fast algebraic attacks and higher-order non-linearities

    Q. Wang, Thomas Johansson & H. Kan, 2012, In: IET Information Security. 6, 1, p. 41-46

    Research output: Contribution to journalArticle

  49. 2011
  50. A New Version of Grain-128 with Authentication

    Martin Ågren, Martin Hell, Thomas Johansson & Willi Meier, 2011. 19 p.

    Research output: Contribution to conferencePaper, not in proceeding

  51. An improvement to Stern's algorithm

    Thomas Johansson & Carl Löndahl, 2011, (Unpublished) [Publisher information missing].

    Research output: Book/ReportReport

  52. A note on fast algebraic attacks and higher order nonlinearities

    Qichun Wang & Thomas Johansson, 2011, Information Security and Cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Springer, p. 404-414 (Lecture Notes in Computer Science; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  53. Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time

    Martin Hell & Thomas Johansson, 2011, In: Journal of Cryptology. 24, 3, p. 427-445

    Research output: Contribution to journalArticle

Previous 1 2 3 Next