Thomas Johansson

Professor
More filtering options
  1. 2019
  2. A Key Recovery Reaction Attack on QC-MDPC

    Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, In : IEEE Transactions on Information Theory. 65, 3, p. 1845 - 1861 17 p.

    Research output: Contribution to journalArticle

  3. An AEAD Variant of the Grain Stream Cipher

    Martin Hell, Thomas Johansson, Meier, W., Jonathan Sönnerup & Yoshida, H., 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (eds.). Springer Nature Switzerland AG, p. 55-71 17 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  4. Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes

    D'Anvers, J., Qian Guo, Thomas Johansson, Alexander Nilsson, Vercauteren, F. & Verbauwhede, I., 2019, Public-Key Cryptography – PKC 2019. Springer, p. 565-598 (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  5. Improved Decoders for p-ary MDPC

    Canales-Martinez, I., Qian Guo & Thomas Johansson, 2019. 11 p.

    Research output: Contribution to conferencePaper, not in proceeding

  6. 2018
  7. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol

    Deneuville, J. C., Gaborit, P., Qian Guo & Thomas Johansson, 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 1450-1454 5 p. 8437940

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. 2017
  9. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P., 2017 Jan, In : Designs, Codes, and Cryptography. 82, 1, p. 1-2 2 p.

    Research output: Contribution to journalDebate/Note/Editorial

  10. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer Verlag, Vol. 10346 LNCS. p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  11. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 323-346 (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  12. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  13. 2016
  14. Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension

    Löndahl, C., Thomas Johansson, Koochak Shooshtari, M., Ahmadian-Attari, M. & Aref, M. R., 2016 Aug 1, In : Designs, Codes, and Cryptography. 80, 2, p. 359-377 19 p.

    Research output: Contribution to journalArticle

  15. A p-ary MDPC scheme.

    Qian Guo & Thomas Johansson, 2016 Jul 10, IEEE International Symposium on Information Theory, ISIT 2016.. Barcelona, Spain.: IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1356-1360 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  16. Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes

    Koochak Shooshtari, M., Ahmadian-Attari, M., Thomas Johansson & Aref, M. R., 2016 Jul 1, In : IET Information Security. 10, 4, p. 194-202 9 p.

    Research output: Contribution to journalArticle

  17. A key recovery attack on MDPC with CCA security using decoding errors

    Qian Guo, Thomas Johansson & Paul Stankovski, 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, Vol. 10031 LNCS. p. 789-815 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  18. 2015
  19. A New Algorithm for Solving Ring-LPN With a Reducible Polynomial

    Qian Guo, Thomas Johansson & Löndahl, C., 2015, In : IEEE Transactions on Information Theory. 61, 11, p. 6204-6212

    Research output: Contribution to journalArticle

  20. Coded-BKW: Solving LWE Using Lattice Codes.

    Qian Guo, Thomas Johansson & Paul Stankovski, 2015, Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (eds.). Springer, Vol. 9215. p. 23-42

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  21. 2014
  22. Solving LPN Using Covering Codes

    Qian Guo, Thomas Johansson & Löndahl, C., 2014, Advances in Cryptology - Asiacrypt 2014. Iwata, T. & Sarkar, P. (eds.). Springer, Vol. 8873. p. 1-20

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  23. 2013
  24. Advances in Cryptology -- EUROCRYPT 2013

    Thomas Johansson (ed.) & Phong Q., N. (ed.), 2013, [Publisher information missing].

    Research output: Book/ReportAnthology (editor)

  25. A new algorithm for finding low-weight polynomial multiples and its application to TCHo

    Thomas Johansson & Löndahl, C., 2013, Preproceedings The International Workshop on Coding and Cryptography WCC 2013. Budaghyan, L., Helleseth, T. & Parker, M. G. (eds.). The Selmer Center at the University of Bergen, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  26. Improved Key Recovery Attack on the BEAN Stream Cipher

    Wang, H., Martin Hell, Thomas Johansson & Ågren, M., 2013, In : IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E96A, 6, p. 1437-1444

    Research output: Contribution to journalArticle

  27. 2012
  28. Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques

    Pointcheval, D. (ed.) & Thomas Johansson (ed.), 2012, Springer. (Lecture Notes in Computer Science; vol. 7237)

    Research output: Book/ReportAnthology (editor)

  29. Analysis of Xorrotation With Application to an HC-128 Variant

    Paul Stankovski, Martin Hell & Thomas Johansson, 2012, LNCS. Susilo, W., Mu, Y. & Seberry, J. (eds.). Springer, Vol. 7372. p. 419-425

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  30. A new version of McEliece PKC based on convolutional codes

    Löndahl, C. & Thomas Johansson, 2012, Information and Communications Security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Springer, p. 461-470 10 p. (Lecture Notes in Computer Science; vol. 7618).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  31. A Survey on Fast Correlation Attacks

    Ågren, M., Löndahl, C., Martin Hell & Thomas Johansson, 2012, In : Cryptography and Communications. 4, 3-4, p. 173-202

    Research output: Contribution to journalReview article

  32. Improved distinguishers for HC-128

    Paul Stankovski, Ruj, S., Martin Hell & Thomas Johansson, 2012, In : Designs, Codes and Cryptography. 63, 2, p. 225-240

    Research output: Contribution to journalArticle

  33. Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials

    Martin Hell, Thomas Johansson, Brynielsson, L. & Englund, H., 2012, In : IEEE Transactions on Information Theory. 58, 9, p. 6183-6193

    Research output: Contribution to journalArticle

  34. Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers

    Ågren, M., Martin Hell, Thomas Johansson & Löndahl, C., 2012, 7th International Symposium onTurbo Codes and Iterative Information Processing (ISTC), 2012. IEEE--Institute of Electrical and Electronics Engineers Inc., p. 260-264

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  35. On Hardware-Oriented Message Authentication

    Ågren, M., Martin Hell & Thomas Johansson, 2012, In : IET Information Security. 6, 4, p. 329-336

    Research output: Contribution to journalArticle

  36. Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry

    Leonardo A, M., Albin, Z., Ben Smeets, Sheikh M., H., Thomas Johansson & Nahid, S., 2012, [Host publication title missing]. IEEE--Institute of Electrical and Electronics Engineers Inc., 6 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  37. Some results on fast algebraic attacks and higher-order non-linearities

    Wang, Q., Thomas Johansson & Kan, H., 2012, In : IET Information Security. 6, 1, p. 41-46

    Research output: Contribution to journalArticle

  38. 2011
  39. A New Version of Grain-128 with Authentication

    Ågren, M., Martin Hell, Thomas Johansson & Meier, W., 2011. 19 p.

    Research output: Contribution to conferencePaper, not in proceeding

  40. An improvement to Stern's algorithm

    Thomas Johansson & Löndahl, C., 2011, (Unpublished) [Publisher information missing].

    Research output: Book/ReportReport

  41. A note on fast algebraic attacks and higher order nonlinearities

    Wang, Q. & Thomas Johansson, 2011, Information Security and Cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Springer, p. 404-414 (Lecture Notes in Computer Science; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  42. Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time

    Martin Hell & Thomas Johansson, 2011, In : Journal of Cryptology. 24, 3, p. 427-445

    Research output: Contribution to journalArticle

  43. Evaluation of Some Algorithms for Hardware-Oriented Message Authentication

    Ågren, M., Martin Hell & Thomas Johansson, 2011, [Publisher information missing]. 9 p.

    Research output: Book/ReportReport

  44. Grain-128a: a new version of Grain-128 with optional authentication

    Ågren, M., Martin Hell, Thomas Johansson & Meier, W., 2011, In : International Journal of Wireless and Mobile Computing. 5, 1, p. 48-59

    Research output: Contribution to journalArticle

  45. Linear Attacks on Stream Ciphers

    Martin Hell & Thomas Johansson, 2011, Advanced Linear Cryptanalysis of Block and Stream Ciphers/Cryptology and Information Security Series. IOS Press, p. 55-85

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  46. On equivalence classes of Boolean functions

    Wang, Q. & Thomas Johansson, 2011, Information Security and Cryptology - ICISC 2010 : 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Springer, p. 311-324 (Lecture Notes in Computer Science; vol. 6829).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  47. On Hardware-Oriented Message Authentication with Applications Towards RFID

    Ågren, M., Martin Hell & Thomas Johansson, 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications. Kellenberger, P. (ed.). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 26-33 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  48. 2010
  49. Security Evaluation of Stream Cipher Enocoro-128v2

    Martin Hell & Thomas Johansson, 2010, CRYPTREC Technical Report. 31 p.

    Research output: Book/ReportReport

  50. 2009
  51. An efficient state recovery attack on X-FCSR-256

    Paul Stankovski, Martin Hell & Thomas Johansson, 2009, Fast Software Encryption/Lecture Notes in Computer Science. Dunkelman, O. (ed.). Springer, Vol. 5665. p. 23-37

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  52. An overview of distinguishing attacks on stream ciphers

    Martin Hell, Thomas Johansson & Brynielsson, L., 2009, In : Cryptography and Communications. 1, 1, p. 71-94

    Research output: Contribution to journalArticle

  53. Control of a turbo charged NVO HCCI engine using a model based approach

    Aulin, H., Thomas Johansson, Per Tunestål & Johansson, B., 2009, 2009 IFAC Workshop on Engine and Powertrain Control, Simulation and Modeling, E-COSM'09 - Final Report. 26 ed. Vol. 42. p. 79-86 8 p. (IFAC Proceedings Volumes).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  54. Improving the rainbow attack by reusing colours

    Ågren, M., Thomas Johansson & Martin Hell, 2009, Cryptology and Network Security/Lecture Notes in Computer Science. Garay, J. A., Miyaji, A. & Otsuka, A. (eds.). Springer, Vol. 5888. p. 362-378

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

Previous 1 2 3 Next