Thomas Johansson
Titel
Professor
Organisation
046-2223182
Thomas [dot] Johansson [at] eit [dot] lth [dot] se
Publikationer (hämtat ur Lunds universitets publikationsdatabas)
författare
- 2012
- A Survey on Fast Correlation Attacks
- A new version of McEliece PKC based on convolutional codes
- An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
- Analysis of Xorrotation With Application to an HC-128 Variant
- Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials
- Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers
- Improved distinguishers for HC-128
- On Hardware-Oriented Message Authentication
- Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
- Some results on fast algebraic attacks and higher-order non-linearities
- 2011
- A New Version of Grain-128 with Authentication
- A note on fast algebraic attacks and higher order nonlinearities
- An improvement to Stern's algorithm
- Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
- Evaluation of Some Algorithms for Hardware-Oriented Message Authentication
- Grain-128a: a new version of Grain-128 with optional authentication
- Linear Attacks on Stream Ciphers
- On Hardware-Oriented Message Authentication with Applications Towards RFID
- On equivalence classes of Boolean functions
- 2010
- 2009
- 2008
- 2007
- A framework for chosen IV statistical analysis of stream ciphers
- A key recovery attack on Edon80
- A linear distinguishing attack on SCREAM
- A note on distinguishing attacks
- Cryptanalysis of Achterbahn-128/80
- Cryptanalysis of Achterbahn-Version 2
- Grain - A stream cipher for constrained environments
- On the problem of finding linear approximations and cryptanalysis of Pomaranch Version 2
- Two General Attacks on Pomaranch-like Keystream Generators
- 2006
- 2005
- 2004
- A memory-efficient optimal APP symbol-elecoding algorithm for linear block codes
- A new simple technique to attack filter generators and related ciphers
- An improved correlation attack on A5/1
- Correlation attacks using a new class of weak feedback polynomials
- New constructions of resilient and correlation immune Boolean functions achieving the upper bound on nonlinearity
- 2003
- A construction of resilient functions with high nonlinearity
- A linear distinguishing attack on Scream
- A new version of the stream cipher SNOW
- A note on the selfshrinking generator
- Analysis and design of modern stream ciphers
- Analysis and design of modern stream ciphers (invited paper)
- Another attack on A5/1
- Predicting the shrinking generator with fixed connections
- 2002
- A fast correlation attack on LILI-128
- Construction of cryptographically important Boolean functions
- Distinguishing attacks on SOBER-t16 and t32
- New techniques for decoding codes in rank metric and its cryptographic applications
- On the complexity of some cryptographic problems based on the general decoding problem
- Theoretical analysis of a correlation attack based on convolutional codes
- 2001
- 2000
- A construction of resilient functions with high nonlinearity
- A construction of resilient functions with high nonlinearity
- A simple algorithm for fast correlation attacks on stream ciphers
- Fast correlation attacks through reconstruction of linear polynomials
- SNOW - A new stream cipher
- Some results on correlations in the Bluetooth stream cipher
- Theoretical analysis of a correlation attack based on convolutional codes
- 1999
- Correlation attacks, convolutional codes, and iterative decoding
- Fast correlation attacks based on turbo code techniques
- Further results on asymmetric authentication schemes
- Further results on the relation between nonlinearity and resiliency of Boolean functions
- Improved fast correlation attacks on stream ciphers via convolutional codes
- 1998
- A simple one sweep algorithm for optimal APP symbol decoding of linear block codes
- A simple one sweep algorithm for optimal APP symbol decoding of linear block codes
- Correlation attacks on stream ciphers and related decoding problems
- On key and message equivocations in secrecy systems
- On some cryptographic problems based on the general decoding problem
- Reduced complexity correlation attacks on two clock-controlled generators
- 1997
- 1996
- 1995
- 1994
- A shift register construction of unconditionally secure authentication codes
- A2-codes and codes for the rank metric
- Contributions to unconditionally secure authentication
- Lower bounds on the probability of deception in authentication with arbitration
- Secrecy codes for source messages of finite length
- 1993
- Lower bounds on the probability of deception in authentication
- On the construction of perfect authentication codes that permit arbitration
- On the construction of universal families of hash functions via geometric codes and concatenation
- On the relation between A-codes and codes correcting independent errors
- Relations between authentication codes and error-correcting codes
- 1991

