Paul Stankovski Wagner

Universitetslektor, Universitetslektor
Fler filtreringsmöjligheter
  1. Autonomy in PhD-education – Supervising for Independence

    Mattias Borg, Fredrik Kopsch, Torgny Roxå, Paul Stankovski & Johannes Svensson, 2016 dec 15, LTHs 9:e Pedagogiska Inspirationskonferens. Andersson, R. & Tempte, L. (red.). LTH, Lund University, s. 9-13 5 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  2. Guarding the Guards: Accountable Authorities in VANETs

    Joakim Brorsson, Paul Stankovski & Martin Hell, 2019, 2018 IEEE Vehicular Networking Conference (VNC). 4 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  3. Laboratory instructions as a cause of student dissonance

    Dey, A., Martin Hell, Rolf, C. C., Paul Stankovski & Ågren, M., 2010, [Host publication title missing]. Andersson, R. & Tempte, L. (red.). LTH, Lund University, 5 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  4. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer, Vol. 10346 LNCS. s. 51-68 18 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  5. Coded-BKW: Solving LWE Using Lattice Codes.

    Qian Guo, Thomas Johansson & Paul Stankovski, 2015, Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (red.). Springer, Vol. 9215. s. 23-42

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  6. A key recovery attack on MDPC with CCA security using decoding errors

    Qian Guo, Thomas Johansson & Paul Stankovski, 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, Vol. 10031 LNCS. s. 789-815 27 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  7. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE - Institute of Electrical and Electronics Engineers Inc., s. 1793-1797

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  8. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, s. 323-346 (Lecture Notes in Computer Science; vol. 10624).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  9. On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2019 aug, I : IEEE Transactions on Information Theory. 65, 8, s. 5243-5259 16 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  10. A Key Recovery Reaction Attack on QC-MDPC

    Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, I : IEEE Transactions on Information Theory. 65, 3, s. 1845 - 1861 17 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  11. eavesROP: Listening for ROP Payloads in Data Streams

    Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell, 2014, Information Security/Lecture Notes in Computer Science. Chow, S. S. M., Camenisch, J., Hui, L. C. K. & Yiu, S. M. (red.). Springer, Vol. 8783. s. 413-424 (Lecture Notes in Computer Science; vol. 8783).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  12. eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)

    Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell, 2014, (Unpublished) [Publisher information missing].

    Forskningsoutput: Bok/rapportRapport

  13. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski, 2017 feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. s. 225-232 8 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  14. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski, 2018 jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, s. 273-294 22 s. (Communications in Computer and Information Science; vol. 867).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  15. Error Amplification in Code-based Cryptography

    Alexander Nilsson, Thomas Johansson & Paul Stankovski, 2018 nov 12, I : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2019, 1, s. 238-258

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  16. An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers

    Paul Stankovski, Martin Hell & Thomas Johansson, 2014, I : Journal of Cryptology. 27, 1, s. 1-22

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  17. Improved distinguishers for HC-128

    Paul Stankovski, Ruj, S., Martin Hell & Thomas Johansson, 2012, I : Designs, Codes and Cryptography. 63, 2, s. 225-240

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  18. Greedy distinguishers and nonrandomness detectors

    Paul Stankovski, 2010, Progress in Cryptology - INDOCRYPT 2010 / Lecture Notes in Computer Science. Gong, G. & Gupta, K. C. (red.). Springer, Vol. 6498. s. 210-226 17 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  19. Cryptanalysis of Selected Stream Ciphers

    Paul Stankovski, 2013, Department of Electrical and Information Technology, Lund University.

    Forskningsoutput: AvhandlingDoktorsavhandling (monografi)

  20. An Optimal Sampling Technique for Distinguishing Random S-boxes

    Paul Stankovski & Martin Hell, 2012, Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on. Viswanath, P. (red.). s. 846-850 5 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  21. Analysis of Xorrotation With Application to an HC-128 Variant

    Paul Stankovski, Martin Hell & Thomas Johansson, 2012, LNCS. Susilo, W., Mu, Y. & Seberry, J. (red.). Springer, Vol. 7372. s. 419-425

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  22. The Efficiency of Optimal Sampling in the Random S-box Model

    Paul Stankovski, Brynielsson, L. & Martin Hell, 2014, [Host publication title missing]. IEEE - Institute of Electrical and Electronics Engineers Inc., s. 1712-1716

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  23. Automated algebraic cryptanalysis

    Paul Stankovski, 2010, I : Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010. s. 11-11

    Forskningsoutput: TidskriftsbidragPublicerat konferensabstract

  24. An efficient state recovery attack on X-FCSR-256

    Paul Stankovski, Martin Hell & Thomas Johansson, 2009, Fast Software Encryption/Lecture Notes in Computer Science. Dunkelman, O. (red.). Springer, Vol. 5665. s. 23-37

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  25. A generalized birthday approach for efficiently finding linear relations in l-sequences

    Wang, H., Paul Stankovski & Thomas Johansson, 2015, I : Designs, Codes and Cryptography. 74, 1, s. 41-57

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift