![]() | ![]() |
2002 | ||
---|---|---|
6 | Thomas Johansson, Fredrik Jönsson: On the complexity of some cryptographic problems based on the general decoding problem. IEEE Transactions on Information Theory 48(10): 2669-2678 (2002) | |
5 | Thomas Johansson, Fredrik Jönsson: Theoretical analysis of a correlation attack based on convolutional codes. IEEE Transactions on Information Theory 48(8): 2173-2181 (2002) | |
4 | EE | Fredrik Jönsson, Thomas Johansson: A fast correlation attack on LILI-128. Inf. Process. Lett. 81(3): 127-132 (2002) |
2000 | ||
3 | EE | Thomas Johansson, Fredrik Jönsson: Fast Correlation Attacks through Reconstruction of Linear Polynomials. CRYPTO 2000: 300-315 |
1999 | ||
2 | EE | Thomas Johansson, Fredrik Jönsson: Fast Correlation Attacks Based on Turbo Code Techniques. CRYPTO 1999: 181-197 |
1 | EE | Thomas Johansson, Fredrik Jönsson: Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes. EUROCRYPT 1999: 347-362 |
1 | Thomas Johansson | [1] [2] [3] [4] [5] [6] |