Follow
Thomas Johansson
Thomas Johansson
Dept of EIT, Lund University, Sweden
Verified email at eit.lth.se
Title
Cited by
Cited by
Year
Grain: a stream cipher for constrained environments
M Hell, T Johansson, W Meier
International journal of wireless and mobile computing 2 (1), 86-93, 2007
6932007
A new version of the stream cipher SNOW
P Ekdahl, T Johansson
Selected Areas in Cryptography, 47-61, 2003
4512003
A stream cipher proposal: Grain-128
M Hell, T Johansson, A Maximov, W Meier
2006 IEEE International Symposium on Information Theory, 1614-1618, 2006
3462006
The Grain Family of Stream Ciphers,
M Hell, T Johansson, A Maximov, W Meier
Lecture Notes In Computer Science: New Stream Cipher Designs: The eSTREAM …, 2008
3012008
Grain-128a: a new version of Grain-128 with optional authentication
M ? gren, M Hell, T Johansson, W Meier
International Journal of Wireless and Mobile Computing 5 (1), 48-59, 2011
2922011
Improved fast correlation attacks on stream ciphers via convolutional codes
T Johansson, F Jönsson
International Conference on the Theory and Applications of Cryptographic …, 1999
2491999
Another attack on A5/1
P Ekdahl, T Johansson
IEEE transactions on information theory 49 (1), 284-289, 2003
2372003
A simple algorithm for fast correlation attacks on stream ciphers
VV Chepyzhov, T Johansson, B Smeets
Fast Software Encryption: 7th International Workshop, FSE 2000 New York, NY …, 2001
2202001
A key recovery attack on MDPC with CCA security using decoding errors
Q Guo, T Johansson, P Stankovski
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
2172016
SNOW-a new stream cipher
P Ekdahl, T Johansson
Proceedings of first open NESSIE workshop, KU-Leuven, 167-168, 2000
2112000
Fast correlation attacks through reconstruction of linear polynomials
T Johansson, F Jönsson
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
1992000
On families of hash functions via geometric codes and concatenation
J Bierbrauer, T Johansson, G Kabatianskii, B Smeets
Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 1994
1981994
Fast correlation attacks based on turbo code techniques
T Johansson, F Jönsson
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
1571999
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity
E Pasalic, S Maitra, T Johansson, P Sarkar
Electronic Notes in Discrete Mathematics 6, 158-167, 2001
1452001
A framework for chosen IV statistical analysis of stream ciphers
H Englund, T Johansson, M Sönmez Turan
International Conference on Cryptology in India, 268-281, 2007
1422007
New technique for decoding codes in the rank metric and its cryptography applications
AV Ourivski, T Johansson
Problems of Information Transmission 38 (3), 237-246, 2002
1402002
On the relation between A-codes and codes correcting independent errors
T Johansson, G Kabatianskii, B Smeets
Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application …, 1994
1181994
A construction of resilient functions with high nonlinearity
T Johansson, E Pasalic
IEEE Transactions on Information Theory 49 (2), 494-501, 2003
1122003
A side-channel attack on a masked IND-CCA secure saber KEM implementation
K Ngo, E Dubrova, Q Guo, T Johansson
IACR Transactions on Cryptographic Hardware and Embedded Systems, 676-707, 2021
1082021
A new SNOW stream cipher called SNOW-V
P Ekdahl, T Johansson, A Maximov, J Yang
IACR Transactions on Symmetric Cryptology, 1-42, 2019
1082019
The system can't perform the operation now. Try again later.
Articles 1–20