Thomas Johansson

Professor
Fler filtreringsmöjligheter
  1. 2020
  2. Spectral analysis of ZUC-256

    Jing Yang, Thomas Johansson & Alexander Maximov, 2020 maj 7, I : IACR Transactions on Symmetric Cryptology. 2020, 1, s. 266-288 23 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  3. Solving LPN Using Covering Codes

    Qian Guo, Thomas Johansson & Löndahl, C., 2020 jan, I : Journal of Cryptology. 33, 1, s. 1-33 33 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  4. 2019
  5. A novel CCA attack using decryption errors against LAC

    Qian Guo, Thomas Johansson & Jing Yang, 2019 nov 25, Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, 2019, Proceedings, Part I. Galbraith, S. D. & Moriai, S. (red.). Springer Gabler, s. 82-111 30 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11921 LNCS).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  6. On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2019 aug, I : IEEE Transactions on Information Theory. 65, 8, s. 5243-5259 16 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  7. A Key Recovery Reaction Attack on QC-MDPC

    Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, I : IEEE Transactions on Information Theory. 65, 3, s. 1845 - 1861 17 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  8. An AEAD Variant of the Grain Stream Cipher

    Martin Hell, Thomas Johansson, Meier, W., Jonathan Sönnerup & Yoshida, H., 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (red.). Springer Nature Switzerland AG, s. 55-71 17 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  9. A new birthday-type algorithm for attacking the fresh re-keying countermeasure

    Qian Guo & Thomas Johansson, 2019, I : Information Processing Letters. 146, s. 30-34 5 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  10. A new SNOW stream cipher called SNOW-V

    Ekdahl, P., Thomas Johansson, Maximov, A. & Jing Yang, 2019, I : IACR Transactions on Symmetric Cryptology. 2019, 3, s. 1-42 42 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  11. Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes

    D'Anvers, J., Qian Guo, Thomas Johansson, Alexander Nilsson, Vercauteren, F. & Verbauwhede, I., 2019, Public-Key Cryptography – PKC 2019. Springer, s. 565-598 (Lecture Notes in Computer Science; vol. 11443).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKapitel samlingsverk

  12. Improved Decoders for p-ary MDPC

    Canales-Martinez, I., Qian Guo & Thomas Johansson, 2019. 11 s.

    Forskningsoutput: KonferensbidragKonferenspaper, ej i proceeding/ej förlagsutgivet

  13. Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem

    Bocharova, I. E., Thomas Johansson & Boris D. Kudryashov, 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2019-July. s. 1882-1886 5 s. 8849839

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  14. Vectorized linear approximations for attacks on SNOW 3G

    Jing Yang, Thomas Johansson & Maximov, A., 2019, Fast Software Encryption conference. s. 249-271 ( IACR Transactions on Symmetric Cryptology; vol. 2019, nr. 4).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  15. 2018
  16. Error Amplification in Code-based Cryptography

    Alexander Nilsson, Thomas Johansson & Paul Stankovski, 2018 nov 12, I : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2019, 1, s. 238-258

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  17. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol

    Deneuville, J. C., Gaborit, P., Qian Guo & Thomas Johansson, 2018 aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. s. 1450-1454 5 s. 8437940

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  18. 2017
  19. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P., 2017 jan, I : Designs, Codes, and Cryptography. 82, 1, s. 1-2 2 s.

    Forskningsoutput: TidskriftsbidragDebate/Note/Editorial

  20. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer, Vol. 10346 LNCS. s. 51-68 18 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  21. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, s. 323-346 (Lecture Notes in Computer Science; vol. 10624).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  22. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE - Institute of Electrical and Electronics Engineers Inc., s. 1793-1797

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  23. 2016
  24. Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension

    Löndahl, C., Thomas Johansson, Koochak Shooshtari, M., Ahmadian-Attari, M. & Aref, M. R., 2016 aug 1, I : Designs, Codes, and Cryptography. 80, 2, s. 359-377 19 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  25. A p-ary MDPC scheme.

    Qian Guo & Thomas Johansson, 2016 jul 10, IEEE International Symposium on Information Theory, ISIT 2016.. Barcelona, Spain.: IEEE - Institute of Electrical and Electronics Engineers Inc., s. 1356-1360 5 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  26. Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes

    Koochak Shooshtari, M., Ahmadian-Attari, M., Thomas Johansson & Aref, M. R., 2016 jul 1, I : IET Information Security. 10, 4, s. 194-202 9 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  27. A key recovery attack on MDPC with CCA security using decoding errors

    Qian Guo, Thomas Johansson & Paul Stankovski, 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, Vol. 10031 LNCS. s. 789-815 27 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10031 LNCS).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  28. 2015
  29. A generalized birthday approach for efficiently finding linear relations in l-sequences

    Wang, H., Paul Stankovski & Thomas Johansson, 2015, I : Designs, Codes and Cryptography. 74, 1, s. 41-57

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  30. A New Algorithm for Solving Ring-LPN With a Reducible Polynomial

    Qian Guo, Thomas Johansson & Löndahl, C., 2015, I : IEEE Transactions on Information Theory. 61, 11, s. 6204-6212

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  31. Coded-BKW: Solving LWE Using Lattice Codes.

    Qian Guo, Thomas Johansson & Paul Stankovski, 2015, Advances in Cryptology -- CRYPTO 2015/Lecture notes in computer science. Gennaro, R. & Robshaw, M. (red.). Springer, Vol. 9215. s. 23-42

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  32. 2014
  33. An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers

    Paul Stankovski, Martin Hell & Thomas Johansson, 2014, I : Journal of Cryptology. 27, 1, s. 1-22

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  34. Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications

    Löndahl, C. & Thomas Johansson, 2014, I : Designs, Codes and Cryptography. 73, 2, s. 625-640

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  35. Solving LPN Using Covering Codes

    Qian Guo, Thomas Johansson & Löndahl, C., 2014, Advances in Cryptology - Asiacrypt 2014. Iwata, T. & Sarkar, P. (red.). Springer, Vol. 8873. s. 1-20

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  36. 2013
  37. Advances in Cryptology -- EUROCRYPT 2013

    Thomas Johansson (red.) & Phong Q., N. (red.), 2013, [Publisher information missing].

    Forskningsoutput: Bok/rapportAntologi (redaktör)

  38. A new algorithm for finding low-weight polynomial multiples and its application to TCHo

    Thomas Johansson & Löndahl, C., 2013, Preproceedings The International Workshop on Coding and Cryptography WCC 2013. Budaghyan, L., Helleseth, T. & Parker, M. G. (red.). The Selmer Center at the University of Bergen, 12 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  39. Improved Key Recovery Attack on the BEAN Stream Cipher

    Wang, H., Martin Hell, Thomas Johansson & Ågren, M., 2013, I : IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E96A, 6, s. 1437-1444

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  40. 2012
  41. Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques

    Pointcheval, D. (red.) & Thomas Johansson (red.), 2012, Springer. (Lecture Notes in Computer Science; vol. 7237)

    Forskningsoutput: Bok/rapportAntologi (redaktör)

  42. Analysis of Xorrotation With Application to an HC-128 Variant

    Paul Stankovski, Martin Hell & Thomas Johansson, 2012, LNCS. Susilo, W., Mu, Y. & Seberry, J. (red.). Springer, Vol. 7372. s. 419-425

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  43. A new version of McEliece PKC based on convolutional codes

    Löndahl, C. & Thomas Johansson, 2012, Information and Communications Security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Springer, s. 461-470 10 s. (Lecture Notes in Computer Science; vol. 7618).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  44. A Survey on Fast Correlation Attacks

    Ågren, M., Löndahl, C., Martin Hell & Thomas Johansson, 2012, I : Cryptography and Communications. 4, 3-4, s. 173-202

    Forskningsoutput: TidskriftsbidragÖversiktsartikel

  45. Improved distinguishers for HC-128

    Paul Stankovski, Ruj, S., Martin Hell & Thomas Johansson, 2012, I : Designs, Codes and Cryptography. 63, 2, s. 225-240

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  46. Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials

    Martin Hell, Thomas Johansson, Brynielsson, L. & Englund, H., 2012, I : IEEE Transactions on Information Theory. 58, 9, s. 6183-6193

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  47. Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers

    Ågren, M., Martin Hell, Thomas Johansson & Löndahl, C., 2012, 7th International Symposium onTurbo Codes and Iterative Information Processing (ISTC), 2012. IEEE - Institute of Electrical and Electronics Engineers Inc., s. 260-264

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  48. On Hardware-Oriented Message Authentication

    Ågren, M., Martin Hell & Thomas Johansson, 2012, I : IET Information Security. 6, 4, s. 329-336

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  49. Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry

    Leonardo A, M., Albin, Z., Ben Smeets, Sheikh M., H., Thomas Johansson & Nahid, S., 2012, [Host publication title missing]. IEEE - Institute of Electrical and Electronics Engineers Inc., 6 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  50. Some results on fast algebraic attacks and higher-order non-linearities

    Wang, Q., Thomas Johansson & Kan, H., 2012, I : IET Information Security. 6, 1, s. 41-46

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  51. 2011
  52. A New Version of Grain-128 with Authentication

    Ågren, M., Martin Hell, Thomas Johansson & Meier, W., 2011. 19 s.

    Forskningsoutput: KonferensbidragKonferenspaper, ej i proceeding/ej förlagsutgivet

  53. An improvement to Stern's algorithm

    Thomas Johansson & Löndahl, C., 2011, (Unpublished) [Publisher information missing].

    Forskningsoutput: Bok/rapportRapport

  54. A note on fast algebraic attacks and higher order nonlinearities

    Wang, Q. & Thomas Johansson, 2011, Information Security and Cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Springer, s. 404-414 (Lecture Notes in Computer Science; vol. 6584).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKapitel samlingsverk

  55. Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time

    Martin Hell & Thomas Johansson, 2011, I : Journal of Cryptology. 24, 3, s. 427-445

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  56. Evaluation of Some Algorithms for Hardware-Oriented Message Authentication

    Ågren, M., Martin Hell & Thomas Johansson, 2011, [Publisher information missing]. 9 s.

    Forskningsoutput: Bok/rapportRapport

  57. Grain-128a: a new version of Grain-128 with optional authentication

    Ågren, M., Martin Hell, Thomas Johansson & Meier, W., 2011, I : International Journal of Wireless and Mobile Computing. 5, 1, s. 48-59

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  58. Linear Attacks on Stream Ciphers

    Martin Hell & Thomas Johansson, 2011, Advanced Linear Cryptanalysis of Block and Stream Ciphers/Cryptology and Information Security Series. IOS Press, s. 55-85

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKapitel samlingsverk

  59. On equivalence classes of Boolean functions

    Wang, Q. & Thomas Johansson, 2011, Information Security and Cryptology - ICISC 2010 : 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Springer, s. 311-324 (Lecture Notes in Computer Science; vol. 6829).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKapitel samlingsverk

Föregående 1 2 3 Nästa