| 2008 |
| 10 | EE | Martin Hell,
Thomas Johansson:
Breaking the F-FCSR-H Stream Cipher in Real Time.
ASIACRYPT 2008: 557-569 |
| 2007 |
| 9 | EE | Martin Hell,
Thomas Johansson:
A Key Recovery Attack on Edon80.
ASIACRYPT 2007: 568-581 |
| 8 | EE | Håkan Englund,
Martin Hell,
Thomas Johansson:
Two General Attacks on Pomaranch-Like Keystream Generators.
FSE 2007: 274-289 |
| 7 | EE | Martin Hell,
Thomas Johansson,
Willi Meier:
Grain: a stream cipher for constrained environments.
IJWMC 2(1): 86-93 (2007) |
| 2006 |
| 6 | EE | Martin Hell,
Thomas Johansson:
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.
Selected Areas in Cryptography 2006: 220-233 |
| 5 | EE | Martin Hell,
Thomas Johansson:
Cryptanalysis of Achterbahn-Version 2.
Selected Areas in Cryptography 2006: 45-55 |
| 4 | EE | Martin Hell,
Thomas Johansson:
Two New Attacks on the Self-Shrinking Generator.
IEEE Transactions on Information Theory 52(8): 3837-3843 (2006) |
| 2005 |
| 3 | EE | Guang Gong,
Kishan Chand Gupta,
Martin Hell,
Yassir Nawaz:
Towards a General RC4-Like Keystream Generator.
CISC 2005: 162-174 |
| 2 | EE | Martin Hell,
Thomas Johansson:
Some Attacks on the Bit-Search Generator.
FSE 2005: 215-227 |
| 2004 |
| 1 | EE | Håkan Englund,
Martin Hell,
Thomas Johansson:
Correlation Attacks Using a New Class of Weak Feedback Polynomials.
FSE 2004: 127-142 |