2008 |
53 | EE | Martin Hell,
Thomas Johansson:
Breaking the F-FCSR-H Stream Cipher in Real Time.
ASIACRYPT 2008: 557-569 |
2007 |
52 | EE | Martin Hell,
Thomas Johansson:
A Key Recovery Attack on Edon80.
ASIACRYPT 2007: 568-581 |
51 | EE | Håkan Englund,
Martin Hell,
Thomas Johansson:
Two General Attacks on Pomaranch-Like Keystream Generators.
FSE 2007: 274-289 |
50 | EE | Håkan Englund,
Thomas Johansson,
Meltem Sönmez Turan:
A Framework for Chosen IV Statistical Analysis of Stream Ciphers.
INDOCRYPT 2007: 268-281 |
49 | EE | Alexander Maximov,
Thomas Johansson:
A Linear Distinguishing Attack on Scream.
IEEE Transactions on Information Theory 53(9): 3127-3144 (2007) |
48 | EE | Martin Hell,
Thomas Johansson,
Willi Meier:
Grain: a stream cipher for constrained environments.
IJWMC 2(1): 86-93 (2007) |
2006 |
47 | EE | Thomas Johansson,
Willi Meier,
Frédéric Muller:
Cryptanalysis of Achterbahn.
FSE 2006: 1-14 |
46 | EE | Martin Hell,
Thomas Johansson:
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.
Selected Areas in Cryptography 2006: 220-233 |
45 | EE | Martin Hell,
Thomas Johansson:
Cryptanalysis of Achterbahn-Version 2.
Selected Areas in Cryptography 2006: 45-55 |
44 | EE | Martin Hell,
Thomas Johansson:
Two New Attacks on the Self-Shrinking Generator.
IEEE Transactions on Information Theory 52(8): 3837-3843 (2006) |
43 | EE | Håkan Englund,
Thomas Johansson:
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers.
IJSN 1(1/2): 95-102 (2006) |
2005 |
42 | EE | Alexander Maximov,
Thomas Johansson:
Fast Computation of Large Distributions and Its Cryptographic Applications.
ASIACRYPT 2005: 313-332 |
41 | | Wenhai Fang,
Thomas Johansson,
Lambert Spaanenburg:
Snow 2.0 IP Core for Trusted Hardware.
FPL 2005: 281-286 |
40 | EE | Håkan Englund,
Thomas Johansson:
A New Distinguisher for Clock Controlled Stream Ciphers.
FSE 2005: 181-195 |
39 | EE | Martin Hell,
Thomas Johansson:
Some Attacks on the Bit-Search Generator.
FSE 2005: 215-227 |
38 | EE | Thomas Hellström,
Thomas Johansson,
Ola Ringdahl:
Development of an Autonomous Forest Machine for Path Tracking.
FSR 2005: 603-614 |
2004 |
37 | EE | Håkan Englund,
Martin Hell,
Thomas Johansson:
Correlation Attacks Using a New Class of Weak Feedback Polynomials.
FSE 2004: 127-142 |
36 | EE | Alexander Maximov,
Thomas Johansson,
Steve Babbage:
An Improved Correlation Attack on A5/1.
Selected Areas in Cryptography 2004: 1-18 |
35 | EE | Håkan Englund,
Thomas Johansson:
A New Simple Technique to Attack Filter Generators and Related Ciphers.
Selected Areas in Cryptography 2004: 39-53 |
2003 |
34 | | Thomas Johansson:
Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers
Springer 2003 |
33 | | Thomas Johansson,
Subhamoy Maitra:
Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings
Springer 2003 |
32 | EE | Patrik Ekdahl,
Willi Meier,
Thomas Johansson:
Predicting the Shrinking Generator with Fixed Connections.
EUROCRYPT 2003: 330-344 |
31 | EE | Thomas Johansson:
Analysis and Design of Modern Stream Ciphers: (Invited Paper) p.
IMA Int. Conf. 2003: 66 |
30 | | Patrik Ekdahl,
Thomas Johansson:
Another attack on A5/1.
IEEE Transactions on Information Theory 49(1): 284-289 (2003) |
29 | | Thomas Johansson,
Enes Pasalic:
A construction of resilient functions with high nonlinearity.
IEEE Transactions on Information Theory 49(2): 494-501 (2003) |
2002 |
28 | EE | Patrik Ekdahl,
Thomas Johansson:
Distinguishing Attacks on SOBER-t16 and t32.
FSE 2002: 210-224 |
27 | EE | Soumen Maity,
Thomas Johansson:
Construction of Cryptographically Important Boolean Functions.
INDOCRYPT 2002: 234-245 |
26 | EE | Patrik Ekdahl,
Thomas Johansson:
A New Version of the Stream Cipher SNOW.
Selected Areas in Cryptography 2002: 47-61 |
25 | | Thomas Johansson,
Fredrik Jönsson:
On the complexity of some cryptographic problems based on the general decoding problem.
IEEE Transactions on Information Theory 48(10): 2669-2678 (2002) |
24 | | Thomas Johansson,
Fredrik Jönsson:
Theoretical analysis of a correlation attack based on convolutional codes.
IEEE Transactions on Information Theory 48(8): 2173-2181 (2002) |
23 | EE | Fredrik Jönsson,
Thomas Johansson:
A fast correlation attack on LILI-128.
Inf. Process. Lett. 81(3): 127-132 (2002) |
2001 |
22 | EE | Emir Pasalic,
Subhamoy Maitra,
Thomas Johansson,
Palash Sarkar:
New Constructions of Resilient and Correlation Immune Boolean Functions Achieving Upper Bound on Nonlinearity.
Electronic Notes in Discrete Mathematics 6: 158-167 (2001) |
21 | EE | Kaoru Kurosawa,
Thomas Johansson,
Douglas R. Stinson:
Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications.
J. Cryptology 14(4): 231-253 (2001) |
2000 |
20 | EE | Thomas Johansson,
Fredrik Jönsson:
Fast Correlation Attacks through Reconstruction of Linear Polynomials.
CRYPTO 2000: 300-315 |
19 | EE | Vladimor V. Chepyzhov,
Thomas Johansson,
Ben J. M. Smeets:
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers.
FSE 2000: 181-195 |
1999 |
18 | EE | Thomas Johansson,
Fredrik Jönsson:
Fast Correlation Attacks Based on Turbo Code Techniques.
CRYPTO 1999: 181-197 |
17 | EE | Thomas Johansson,
Fredrik Jönsson:
Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes.
EUROCRYPT 1999: 347-362 |
16 | EE | Enes Pasalic,
Thomas Johansson:
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions.
IMA Int. Conf. 1999: 35-44 |
15 | | Thomas Johansson:
Further Results on Asymmetric Authentication Schemes.
Inf. Comput. 151(1-2): 100-133 (1999) |
1998 |
14 | EE | Thomas Johansson:
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators.
ASIACRYPT 1998: 342-356 |
13 | | Thomas Johansson,
Kamil Sh. Zigangirov:
A Simple One-Sweep Algorithm for Optimal APP Symbol Decoding of Linear Block Codes.
IEEE Transactions on Information Theory 44(7): 3124-3129 (1998) |
1997 |
12 | EE | Thomas Johansson:
Bucket Hashing with a Small Key Size.
EUROCRYPT 1997: 149-162 |
11 | EE | Kaoru Kurosawa,
Thomas Johansson,
Douglas R. Stinson:
Almost k-wise Independent Sample Spaces and Their Cryptologic Applications.
EUROCRYPT 1997: 409-421 |
1996 |
10 | EE | Tor Helleseth,
Thomas Johansson:
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings.
CRYPTO 1996: 31-44 |
9 | | Gregory Kabatianskii,
Ben J. M. Smeets,
Thomas Johansson:
On the cardinality of systematic authentication codes via error-correcting codes.
IEEE Transactions on Information Theory 42(2): 566-578 (1996) |
1995 |
8 | | Thomas Johansson:
Authentication Codes for Nontrusting Parties Obtained from Rank Metric Codes.
Des. Codes Cryptography 6(3): 205-218 (1995) |
1994 |
7 | | Thomas Johansson,
L. R. Virtanen,
J. M. Gobbi:
``Underground Capacitors'' Very Efficient Decoupling for High Performance UHF Signal Processing ICs.
EDAC-ETC-EUROASIC 1994: 655 |
6 | EE | Thomas Johansson,
Ben J. M. Smeets:
On A²-Codes Including Arbiter's Attacks.
EUROCRYPT 1994: 456-460 |
5 | | Thomas Johansson,
Ewert Bengtsson:
A New Parallel MIMD Connected Component Labeling Algorithm.
PARLE 1994: 801-804 |
4 | | Thomas Johansson:
A Shift Register Construction of Unconditionally Secure Authentication Codes.
Des. Codes Cryptography 4(1): 69-81 (1994) |
1993 |
3 | EE | Jürgen Bierbrauer,
Thomas Johansson,
Gregory Kabatianskii,
Ben J. M. Smeets:
On Families of Hash Functions via Geometric Codes and Concatenation.
CRYPTO 1993: 331-342 |
2 | EE | Thomas Johansson:
On the Construction of Perfect Authentication Codes that Permit Arbitration.
CRYPTO 1993: 343-354 |
1 | EE | Thomas Johansson,
Gregory Kabatianskii,
Ben J. M. Smeets:
On the Relation between A-Codes and Codes Correcting Independent Errors.
EUROCRYPT 1993: 1-11 |