dblp.uni-trier.dewww.uni-trier.de

Thomas Johansson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
53EEMartin Hell, Thomas Johansson: Breaking the F-FCSR-H Stream Cipher in Real Time. ASIACRYPT 2008: 557-569
2007
52EEMartin Hell, Thomas Johansson: A Key Recovery Attack on Edon80. ASIACRYPT 2007: 568-581
51EEHåkan Englund, Martin Hell, Thomas Johansson: Two General Attacks on Pomaranch-Like Keystream Generators. FSE 2007: 274-289
50EEHåkan Englund, Thomas Johansson, Meltem Sönmez Turan: A Framework for Chosen IV Statistical Analysis of Stream Ciphers. INDOCRYPT 2007: 268-281
49EEAlexander Maximov, Thomas Johansson: A Linear Distinguishing Attack on Scream. IEEE Transactions on Information Theory 53(9): 3127-3144 (2007)
48EEMartin Hell, Thomas Johansson, Willi Meier: Grain: a stream cipher for constrained environments. IJWMC 2(1): 86-93 (2007)
2006
47EEThomas Johansson, Willi Meier, Frédéric Muller: Cryptanalysis of Achterbahn. FSE 2006: 1-14
46EEMartin Hell, Thomas Johansson: On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2. Selected Areas in Cryptography 2006: 220-233
45EEMartin Hell, Thomas Johansson: Cryptanalysis of Achterbahn-Version 2. Selected Areas in Cryptography 2006: 45-55
44EEMartin Hell, Thomas Johansson: Two New Attacks on the Self-Shrinking Generator. IEEE Transactions on Information Theory 52(8): 3837-3843 (2006)
43EEHåkan Englund, Thomas Johansson: Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. IJSN 1(1/2): 95-102 (2006)
2005
42EEAlexander Maximov, Thomas Johansson: Fast Computation of Large Distributions and Its Cryptographic Applications. ASIACRYPT 2005: 313-332
41 Wenhai Fang, Thomas Johansson, Lambert Spaanenburg: Snow 2.0 IP Core for Trusted Hardware. FPL 2005: 281-286
40EEHåkan Englund, Thomas Johansson: A New Distinguisher for Clock Controlled Stream Ciphers. FSE 2005: 181-195
39EEMartin Hell, Thomas Johansson: Some Attacks on the Bit-Search Generator. FSE 2005: 215-227
38EEThomas Hellström, Thomas Johansson, Ola Ringdahl: Development of an Autonomous Forest Machine for Path Tracking. FSR 2005: 603-614
2004
37EEHåkan Englund, Martin Hell, Thomas Johansson: Correlation Attacks Using a New Class of Weak Feedback Polynomials. FSE 2004: 127-142
36EEAlexander Maximov, Thomas Johansson, Steve Babbage: An Improved Correlation Attack on A5/1. Selected Areas in Cryptography 2004: 1-18
35EEHåkan Englund, Thomas Johansson: A New Simple Technique to Attack Filter Generators and Related Ciphers. Selected Areas in Cryptography 2004: 39-53
2003
34 Thomas Johansson: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers Springer 2003
33 Thomas Johansson, Subhamoy Maitra: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings Springer 2003
32EEPatrik Ekdahl, Willi Meier, Thomas Johansson: Predicting the Shrinking Generator with Fixed Connections. EUROCRYPT 2003: 330-344
31EEThomas Johansson: Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. IMA Int. Conf. 2003: 66
30 Patrik Ekdahl, Thomas Johansson: Another attack on A5/1. IEEE Transactions on Information Theory 49(1): 284-289 (2003)
29 Thomas Johansson, Enes Pasalic: A construction of resilient functions with high nonlinearity. IEEE Transactions on Information Theory 49(2): 494-501 (2003)
2002
28EEPatrik Ekdahl, Thomas Johansson: Distinguishing Attacks on SOBER-t16 and t32. FSE 2002: 210-224
27EESoumen Maity, Thomas Johansson: Construction of Cryptographically Important Boolean Functions. INDOCRYPT 2002: 234-245
26EEPatrik Ekdahl, Thomas Johansson: A New Version of the Stream Cipher SNOW. Selected Areas in Cryptography 2002: 47-61
25 Thomas Johansson, Fredrik Jönsson: On the complexity of some cryptographic problems based on the general decoding problem. IEEE Transactions on Information Theory 48(10): 2669-2678 (2002)
24 Thomas Johansson, Fredrik Jönsson: Theoretical analysis of a correlation attack based on convolutional codes. IEEE Transactions on Information Theory 48(8): 2173-2181 (2002)
23EEFredrik Jönsson, Thomas Johansson: A fast correlation attack on LILI-128. Inf. Process. Lett. 81(3): 127-132 (2002)
2001
22EEEmir Pasalic, Subhamoy Maitra, Thomas Johansson, Palash Sarkar: New Constructions of Resilient and Correlation Immune Boolean Functions Achieving Upper Bound on Nonlinearity. Electronic Notes in Discrete Mathematics 6: 158-167 (2001)
21EEKaoru Kurosawa, Thomas Johansson, Douglas R. Stinson: Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications. J. Cryptology 14(4): 231-253 (2001)
2000
20EEThomas Johansson, Fredrik Jönsson: Fast Correlation Attacks through Reconstruction of Linear Polynomials. CRYPTO 2000: 300-315
19EEVladimor V. Chepyzhov, Thomas Johansson, Ben J. M. Smeets: A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. FSE 2000: 181-195
1999
18EEThomas Johansson, Fredrik Jönsson: Fast Correlation Attacks Based on Turbo Code Techniques. CRYPTO 1999: 181-197
17EEThomas Johansson, Fredrik Jönsson: Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes. EUROCRYPT 1999: 347-362
16EEEnes Pasalic, Thomas Johansson: Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions. IMA Int. Conf. 1999: 35-44
15 Thomas Johansson: Further Results on Asymmetric Authentication Schemes. Inf. Comput. 151(1-2): 100-133 (1999)
1998
14EEThomas Johansson: Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. ASIACRYPT 1998: 342-356
13 Thomas Johansson, Kamil Sh. Zigangirov: A Simple One-Sweep Algorithm for Optimal APP Symbol Decoding of Linear Block Codes. IEEE Transactions on Information Theory 44(7): 3124-3129 (1998)
1997
12EEThomas Johansson: Bucket Hashing with a Small Key Size. EUROCRYPT 1997: 149-162
11EEKaoru Kurosawa, Thomas Johansson, Douglas R. Stinson: Almost k-wise Independent Sample Spaces and Their Cryptologic Applications. EUROCRYPT 1997: 409-421
1996
10EETor Helleseth, Thomas Johansson: Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. CRYPTO 1996: 31-44
9 Gregory Kabatianskii, Ben J. M. Smeets, Thomas Johansson: On the cardinality of systematic authentication codes via error-correcting codes. IEEE Transactions on Information Theory 42(2): 566-578 (1996)
1995
8 Thomas Johansson: Authentication Codes for Nontrusting Parties Obtained from Rank Metric Codes. Des. Codes Cryptography 6(3): 205-218 (1995)
1994
7 Thomas Johansson, L. R. Virtanen, J. M. Gobbi: ``Underground Capacitors'' Very Efficient Decoupling for High Performance UHF Signal Processing ICs. EDAC-ETC-EUROASIC 1994: 655
6EEThomas Johansson, Ben J. M. Smeets: On A²-Codes Including Arbiter's Attacks. EUROCRYPT 1994: 456-460
5 Thomas Johansson, Ewert Bengtsson: A New Parallel MIMD Connected Component Labeling Algorithm. PARLE 1994: 801-804
4 Thomas Johansson: A Shift Register Construction of Unconditionally Secure Authentication Codes. Des. Codes Cryptography 4(1): 69-81 (1994)
1993
3EEJürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets: On Families of Hash Functions via Geometric Codes and Concatenation. CRYPTO 1993: 331-342
2EEThomas Johansson: On the Construction of Perfect Authentication Codes that Permit Arbitration. CRYPTO 1993: 343-354
1EEThomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets: On the Relation between A-Codes and Codes Correcting Independent Errors. EUROCRYPT 1993: 1-11

Coauthor Index

1Steve Babbage [36]
2Ewert Bengtsson [5]
3Jürgen Bierbrauer [3]
4Vladimor V. Chepyzhov [19]
5Patrik Ekdahl [26] [28] [30] [32]
6Håkan Englund [35] [37] [40] [43] [50] [51]
7Wenhai Fang [41]
8J. M. Gobbi [7]
9Martin Hell [37] [39] [44] [45] [46] [48] [51] [52] [53]
10Tor Helleseth [10]
11Thomas Hellström [38]
12Fredrik Jönsson [17] [18] [20] [23] [24] [25]
13Gregory Kabatianskii [1] [3] [9]
14Kaoru Kurosawa [11] [21]
15Subhamoy Maitra [22] [33]
16Soumen Maity [27]
17Alexander Maximov [36] [42] [49]
18Willi Meier [32] [47] [48]
19Frédéric Muller [47]
20Emir Pasalic [22]
21Enes Pasalic [16] [29]
22Ola Ringdahl [38]
23Palash Sarkar [22]
24Ben J. M. Smeets (Bernhard Smeets) [1] [3] [6] [9] [19]
25Lambert Spaanenburg [41]
26Douglas R. Stinson [11] [21]
27Meltem Sönmez Turan [50]
28L. R. Virtanen [7]
29Kamil Sh. Zigangirov [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)