2008 |
10 | EE | Martin Hell,
Thomas Johansson:
Breaking the F-FCSR-H Stream Cipher in Real Time.
ASIACRYPT 2008: 557-569 |
2007 |
9 | EE | Martin Hell,
Thomas Johansson:
A Key Recovery Attack on Edon80.
ASIACRYPT 2007: 568-581 |
8 | EE | Håkan Englund,
Martin Hell,
Thomas Johansson:
Two General Attacks on Pomaranch-Like Keystream Generators.
FSE 2007: 274-289 |
7 | EE | Martin Hell,
Thomas Johansson,
Willi Meier:
Grain: a stream cipher for constrained environments.
IJWMC 2(1): 86-93 (2007) |
2006 |
6 | EE | Martin Hell,
Thomas Johansson:
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.
Selected Areas in Cryptography 2006: 220-233 |
5 | EE | Martin Hell,
Thomas Johansson:
Cryptanalysis of Achterbahn-Version 2.
Selected Areas in Cryptography 2006: 45-55 |
4 | EE | Martin Hell,
Thomas Johansson:
Two New Attacks on the Self-Shrinking Generator.
IEEE Transactions on Information Theory 52(8): 3837-3843 (2006) |
2005 |
3 | EE | Guang Gong,
Kishan Chand Gupta,
Martin Hell,
Yassir Nawaz:
Towards a General RC4-Like Keystream Generator.
CISC 2005: 162-174 |
2 | EE | Martin Hell,
Thomas Johansson:
Some Attacks on the Bit-Search Generator.
FSE 2005: 215-227 |
2004 |
1 | EE | Håkan Englund,
Martin Hell,
Thomas Johansson:
Correlation Attacks Using a New Class of Weak Feedback Polynomials.
FSE 2004: 127-142 |