Paul Stankovski Wagner
Universitetslektor, UniversitetslektorAutonomy in PhD-education – Supervising for Independence
Mattias Borg, Fredrik Kopsch, Torgny Roxå, Paul Stankovski & Johannes Svensson, 2016 dec 15, LTHs 9:e Pedagogiska Inspirationskonferens. Andersson, R. & Tempte, L. (red.). LTH, Lund University, s. 9-13 5 s.Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
Guarding the Guards: Accountable Authorities in VANETs
Joakim Brorsson, Paul Stankovski & Martin Hell, 2019, 2018 IEEE Vehicular Networking Conference (VNC). 4 s.Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
Laboratory instructions as a cause of student dissonance
Dey, A., Martin Hell, Rolf, C. C., Paul Stankovski & Ågren, M., 2010, [Host publication title missing]. Andersson, R. & Tempte, L. (red.). LTH, Lund University, 5 s.Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
-
A reaction attack on the QC-LDPC mceliece cryptosystem
Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer, Vol. 10346 LNCS. s. 51-68 18 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
-
Coded-BKW: Solving LWE Using Lattice Codes.
Qian Guo, Thomas Johansson & Paul Stankovski, 2015, Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (red.). Springer, Vol. 9215. s. 23-42Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
-
A key recovery attack on MDPC with CCA security using decoding errors
Qian Guo, Thomas Johansson & Paul Stankovski, 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, Vol. 10031 LNCS. s. 789-815 27 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS).Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
-
Information Set Decoding with Soft Information and some cryptographic applications
Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE - Institute of Electrical and Electronics Engineers Inc., s. 1793-1797Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
-
Coded-BKW with Sieving
Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, s. 323-346 (Lecture Notes in Computer Science; vol. 10624).Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
-
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2019 aug, I : IEEE Transactions on Information Theory. 65, 8, s. 5243-5259 16 s.Forskningsoutput: Tidskriftsbidrag › Artikel i vetenskaplig tidskrift
-
A Key Recovery Reaction Attack on QC-MDPC
Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, I : IEEE Transactions on Information Theory. 65, 3, s. 1845 - 1861 17 s.Forskningsoutput: Tidskriftsbidrag › Artikel i vetenskaplig tidskrift
eavesROP: Listening for ROP Payloads in Data Streams
Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell, 2014, Information Security/Lecture Notes in Computer Science. Chow, S. S. M., Camenisch, J., Hui, L. C. K. & Yiu, S. M. (red.). Springer, Vol. 8783. s. 413-424 (Lecture Notes in Computer Science; vol. 8783).Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell, 2014, (Unpublished) [Publisher information missing].Forskningsoutput: Bok/rapport › Rapport
-
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
Thomas Johansson, Qian Guo, Paul Stankovski & Erik Mårtensson, 2019 feb, (Accepted/In press) I : Advances in Mathematics of Communications.Forskningsoutput: Tidskriftsbidrag › Artikel i vetenskaplig tidskrift
Improved Greedy Nonrandomness Detectors for Stream Ciphers
Linus Karlsson, Martin Hell & Paul Stankovski, 2017 feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. s. 225-232 8 s.Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
Not so greedy: Enhanced subset exploration for nonrandomness detectors
Linus Karlsson, Martin Hell & Paul Stankovski, 2018 jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, s. 273-294 22 s. (Communications in Computer and Information Science; vol. 867).Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
Error Amplification in Code-based Cryptography
Alexander Nilsson, Thomas Johansson & Paul Stankovski, 2018 nov 12, I : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2019, 1, s. 238-258Forskningsoutput: Tidskriftsbidrag › Artikel i vetenskaplig tidskrift
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
Paul Stankovski, Martin Hell & Thomas Johansson, 2014, I : Journal of Cryptology. 27, 1, s. 1-22Forskningsoutput: Tidskriftsbidrag › Artikel i vetenskaplig tidskrift
Improved distinguishers for HC-128
Paul Stankovski, Ruj, S., Martin Hell & Thomas Johansson, 2012, I : Designs, Codes and Cryptography. 63, 2, s. 225-240Forskningsoutput: Tidskriftsbidrag › Artikel i vetenskaplig tidskrift
Greedy distinguishers and nonrandomness detectors
Paul Stankovski, 2010, Progress in Cryptology - INDOCRYPT 2010 / Lecture Notes in Computer Science. Gong, G. & Gupta, K. C. (red.). Springer, Vol. 6498. s. 210-226 17 s.Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
Cryptanalysis of Selected Stream Ciphers
Paul Stankovski, 2013, Department of Electrical and Information Technology, Lund University.Forskningsoutput: Avhandling › Doktorsavhandling (monografi)
An Optimal Sampling Technique for Distinguishing Random S-boxes
Paul Stankovski & Martin Hell, 2012, Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on. Viswanath, P. (red.). s. 846-850 5 s.Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
Analysis of Xorrotation With Application to an HC-128 Variant
Paul Stankovski, Martin Hell & Thomas Johansson, 2012, LNCS. Susilo, W., Mu, Y. & Seberry, J. (red.). Springer, Vol. 7372. s. 419-425Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
The Efficiency of Optimal Sampling in the Random S-box Model
Paul Stankovski, Brynielsson, L. & Martin Hell, 2014, [Host publication title missing]. IEEE - Institute of Electrical and Electronics Engineers Inc., s. 1712-1716Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
Automated algebraic cryptanalysis
Paul Stankovski, 2010, I : Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010. s. 11-11Forskningsoutput: Tidskriftsbidrag › Publicerat konferensabstract
An efficient state recovery attack on X-FCSR-256
Paul Stankovski, Martin Hell & Thomas Johansson, 2009, Fast Software Encryption/Lecture Notes in Computer Science. Dunkelman, O. (red.). Springer, Vol. 5665. s. 23-37Forskningsoutput: Kapitel i bok/rapport/Conference proceeding › Konferenspaper i proceeding
A generalized birthday approach for efficiently finding linear relations in l-sequences
Wang, H., Paul Stankovski & Thomas Johansson, 2015, I : Designs, Codes and Cryptography. 74, 1, s. 41-57Forskningsoutput: Tidskriftsbidrag › Artikel i vetenskaplig tidskrift