Thomas Johansson
Thomas Johansson
Dept of EIT, Lund University, Sweden
Verified email at eit.lth.se
Title
Cited by
Cited by
Year
Grain: a stream cipher for constrained environments
M Hell, T Johansson, W Meier
International journal of wireless and mobile computing 2 (1), 86-93, 2007
5452007
A new version of the stream cipher SNOW
P Ekdahl, T Johansson
Selected Areas in Cryptography, 47-61, 2003
3482003
A stream cipher proposal: Grain-128
M Hell, T Johansson, A Maximov, W Meier
2006 IEEE International Symposium on Information Theory, 1614-1618, 2006
2522006
The Grain Family of Stream Ciphers,
M Hell, T Johansson, A Maximov, W Meier
Lecture Notes In Computer Science: New Stream Cipher Designs: The eSTREAM …, 2008
2322008
Grain-128a: a new version of Grain-128 with optional authentication
M ? gren, M Hell, T Johansson, W Meier
International Journal of Wireless and Mobile Computing 5 (1), 48-59, 2011
216*2011
Improved fast correlation attacks on stream ciphers via convolutional codes
T Johansson, F Jönsson
International Conference on the Theory and Applications of Cryptographic …, 1999
2151999
Another attack on A5/1
P Ekdahl, T Johansson
IEEE transactions on information theory 49 (1), 284-289, 2003
1972003
A simple algorithm for fast correlation attacks on stream ciphers
VV Chepyzhov, T Johansson, B Smeets
International Workshop on Fast Software Encryption, 181-195, 2000
1792000
SNOW-a new stream cipher
P Ekdahl, T Johansson
Proceedings of first open NESSIE workshop, KU-Leuven, 167-168, 2000
1712000
Fast correlation attacks through reconstruction of linear polynomials
T Johansson, F Jönsson
Annual International Cryptology Conference, 300-315, 2000
1692000
On families of hash functions via geometric codes and concatenation
J Bierbrauer, T Johansson, G Kabatianskii, B Smeets
Annual International Cryptology Conference, 331-342, 1993
1551993
Fast correlation attacks based on turbo code techniques
T Johansson, F Jönsson
Annual International Cryptology Conference, 181-197, 1999
1351999
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity
E Pasalic, S Maitra, T Johansson, P Sarkar
Electronic Notes in Discrete Mathematics 6, 158-167, 2001
1282001
A framework for chosen IV statistical analysis of stream ciphers
H Englund, T Johansson, MS Turan
International Conference on Cryptology in India, 268-281, 2007
1272007
A key recovery attack on MDPC with CCA security using decoding errors
Q Guo, T Johansson, P Stankovski
International Conference on the Theory and Application of Cryptology and …, 2016
1242016
A construction of resilient functions with high nonlinearity
T Johansson, E Pasalic
IEEE Transactions on Information Theory 49 (2), 494-501, 2003
962003
On the relation between A-codes and codes correcting independent errors
T Johansson, G Kabatianskii, B Smeets
Workshop on the Theory and Application of of Cryptographic Techniques, 1-11, 1993
951993
Lower bounds on the probability of deception in authentication with arbitration
T Johansson
IEEE Transactions on Information Theory 40 (5), 1573-1585, 1994
931994
New technique for decoding codes in the rank metric and its cryptography applications
AV Ourivski, T Johansson
Problems of Information Transmission 38 (3), 237-246, 2002
902002
Reduced complexity correlation attacks on two clock-controlled generators
T Johansson
International Conference on the Theory and Application of Cryptology and …, 1998
901998
The system can't perform the operation now. Try again later.
Articles 1–20