What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Thomas Johansson
Google Scholar
ORCID:
0000-0003-1798-570X
63
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
A New Stand-Alone MAC Construct Called SMAC.
Dachao Wang
Alexander Maximov
Patrik Ekdahl
Thomas Johansson
2025
conf/eurosp
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem.
Thomas Johansson
Mustafa Khairallah
Vu Nguyen
2024
conf/uss
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures.
Qian Guo
Denis Nabokov
Elias Suvanto
Thomas Johansson
2024
conf/icics
Formal Analysis of Julia Key Agreement Protocol.
Navya Sivaraman
Simin Nadjm-Tehrani
Thomas Johansson
2023
journals/tches
Cache-Timing Attack Against HQC.
Senyang Huang
Rui Qi Sim
Chitchanok Chuengsatiansup
Qian Guo
Thomas Johansson
2023
conf/asiacrypt
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes.
Qian Guo
Denis Nabokov
Alexander Nilsson
Thomas Johansson
2022
journals/tches
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations.
Qian Guo
Andreas Johansson
Thomas Johansson
2022
journals/tches
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE.
Qian Guo
Clemens Hlauschek
Thomas Johansson
Norman Lahr
Alexander Nilsson
Robin Leander Schröder
2022
journals/tosc
Attacks on the Firekite Cipher.
Thomas Johansson
Willi Meier
Vu Nguyen
2021
journals/tches
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.
Kalle Ngo
Elena Dubrova
Qian Guo
Thomas Johansson
2021
journals/tosc
Improved guess-and-determine and distinguishing attacks on SNOW-V.
Jing Yang
Thomas Johansson
Alexander Maximov
2021
conf/ccs
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis.
Kalle Ngo
Elena Dubrova
Thomas Johansson
2021
conf/asiacrypt
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS.
Qian Guo
Thomas Johansson
2021
conf/wisec
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs.
Patrik Ekdahl
Alexander Maximov
Thomas Johansson
Jing Yang
2021
conf/cans
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction.
Martin Hell
Thomas Johansson
Alexander Maximov
Willi Meier
Hirotaka Yoshida
2020
journals/tosc
Spectral analysis of ZUC-256.
Jing Yang
Thomas Johansson
Alexander Maximov
2020
journals/joc
Solving LPN Using Covering Codes.
Qian Guo
Thomas Johansson
Carl Löndahl
2020
conf/crypto
A Key-Recovery Timing Attack on Post-quantum Primitives Using the Fujisaki-Okamoto Transformation and Its Application on FrodoKEM.
Qian Guo
Thomas Johansson
Alexander Nilsson
2020
conf/asiacrypt
A New Decryption Failure Attack Against HQC.
Qian Guo
Thomas Johansson
2019
journals/tches
Error Amplification in Code-based Cryptography.
Alexander Nilsson
Thomas Johansson
Paul Stankovski
2019
journals/tosc
Vectorized linear approximations for attacks on SNOW 3G.
Jing Yang
Thomas Johansson
Alexander Maximov
2019
journals/tosc
A new SNOW stream cipher called SNOW-V.
Patrik Ekdahl
Thomas Johansson
Alexander Maximov
Jing Yang
2019
conf/pkc
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes.
Jan-Pieter D'Anvers
Qian Guo
Thomas Johansson
Alexander Nilsson
Frederik Vercauteren
Ingrid Verbauwhede
2019
conf/asiacrypt
A Novel CCA Attack Using Decryption Errors Against LAC.
Qian Guo
Thomas Johansson
Jing Yang
2017
conf/asiacrypt
Coded-BKW with Sieving.
Qian Guo
Thomas Johansson
Erik Mårtensson
Paul Stankovski
2016
conf/asiacrypt
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.
Qian Guo
Thomas Johansson
Paul Stankovski
2015
conf/crypto
Coded-BKW: Solving LWE Using Lattice Codes.
Qian Guo
Thomas Johansson
Paul Stankovski
2014
journals/joc
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers.
Paul Stankovski
Martin Hell
Thomas Johansson
2014
conf/asiacrypt
Solving LPN Using Covering Codes.
Qian Guo
Thomas Johansson
Carl Löndahl
2012
conf/acisp
Analysis of Xorrotation with Application to an HC-128 Variant.
Paul Stankovski
Martin Hell
Thomas Johansson
2012
conf/icics
A New Version of McEliece PKC Based on Convolutional Codes.
Carl Löndahl
Thomas Johansson
2011
journals/joc
Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time.
Martin Hell
Thomas Johansson
2010
conf/icisc
On Equivalence Classes of Boolean Functions.
Qichun Wang
Thomas Johansson
2009
conf/fse
An Efficient State Recovery Attack on X-FCSR-256.
Paul Stankovski
Martin Hell
Thomas Johansson
2009
conf/cans
Improving the Rainbow Attack by Reusing Colours.
Martin Ågren
Thomas Johansson
Martin Hell
2008
conf/asiacrypt
Breaking the F-FCSR-H Stream Cipher in Real Time.
Martin Hell
Thomas Johansson
2007
conf/fse
Two General Attacks on Pomaranch-Like Keystream Generators.
Håkan Englund
Martin Hell
Thomas Johansson
2007
conf/asiacrypt
A Key Recovery Attack on Edon80.
Martin Hell
Thomas Johansson
2006
conf/fse
Cryptanalysis of Achterbahn.
Thomas Johansson
Willi Meier
Frédéric Muller
2006
conf/sacrypt
Cryptanalysis of Achterbahn-Version 2.
Martin Hell
Thomas Johansson
2006
conf/sacrypt
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.
Martin Hell
Thomas Johansson
2005
conf/fse
A New Distinguisher for Clock Controlled Stream Ciphers.
Håkan Englund
Thomas Johansson
2005
conf/fse
Some Attacks on the Bit-Search Generator.
Martin Hell
Thomas Johansson
2005
conf/asiacrypt
Fast Computation of Large Distributions and Its Cryptographic Applications.
Alexander Maximov
Thomas Johansson
2004
conf/fse
Correlation Attacks Using a New Class of Weak Feedback Polynomials.
Håkan Englund
Martin Hell
Thomas Johansson
2004
conf/sacrypt
A New Simple Technique to Attack Filter Generators and Related Ciphers.
Håkan Englund
Thomas Johansson
2004
conf/sacrypt
An Improved Correlation Attack on A5/1.
Alexander Maximov
Thomas Johansson
Steve Babbage
2003
conf/eurocrypt
Predicting the Shrinking Generator with Fixed Connections.
Patrik Ekdahl
Willi Meier
Thomas Johansson
2002
conf/fse
Distinguishing Attacks on SOBER-t16 and t32.
Patrik Ekdahl
Thomas Johansson
2002
conf/sacrypt
A New Version of the Stream Cipher SNOW.
Patrik Ekdahl
Thomas Johansson
2001
journals/joc
Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications.
Kaoru Kurosawa
Thomas Johansson
Douglas R. Stinson
2000
conf/fse
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers.
Vladimir V. Chepyzhov
Thomas Johansson
Ben J. M. Smeets
2000
conf/crypto
Fast Correlation Attacks through Reconstruction of Linear Polynomials.
Thomas Johansson
Fredrik Jönsson
1999
conf/crypto
Fast Correlation Attacks Based on Turbo Code Techniques.
Thomas Johansson
Fredrik Jönsson
1999
conf/eurocrypt
Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes.
Thomas Johansson
Fredrik Jönsson
1998
conf/asiacrypt
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators.
Thomas Johansson
1997
conf/eurocrypt
Bucket Hashing with a Small Key Size.
Thomas Johansson
1997
conf/eurocrypt
Almost k-wise Independent Sample Spaces and Their Cryptologic Applications.
Kaoru Kurosawa
Thomas Johansson
Douglas R. Stinson
1996
conf/crypto
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings.
Tor Helleseth
Thomas Johansson
1994
conf/eurocrypt
On A²-Codes Including Arbiter's Attacks.
Thomas Johansson
Ben J. M. Smeets
1993
conf/crypto
On the Construction of Perfect Authentication Codes that Permit Arbitration.
Thomas Johansson
1993
conf/crypto
On Families of Hash Functions via Geometric Codes and Concatenation.
Jürgen Bierbrauer
Thomas Johansson
Gregory Kabatianskii
Ben J. M. Smeets
1993
conf/eurocrypt
On the Relation between A-Codes and Codes Correcting Independent Errors.
Thomas Johansson
Gregory Kabatianskii
Ben J. M. Smeets
Coauthors
Alexander Maximov
(9)
Alexander Nilsson
(5)
Andreas Johansson
(1)
Ben J. M. Smeets
(4)
Carl Löndahl
(3)
Chitchanok Chuengsatiansup
(1)
Clemens Hlauschek
(1)
Dachao Wang
(1)
Denis Nabokov
(2)
Douglas R. Stinson
(2)
Elena Dubrova
(2)
Elias Suvanto
(1)
Erik Mårtensson
(1)
Frédéric Muller
(1)
Frederik Vercauteren
(1)
Fredrik Jönsson
(3)
Gregory Kabatianskii
(2)
Håkan Englund
(4)
Hirotaka Yoshida
(1)
Ingrid Verbauwhede
(1)
Jan-Pieter D'Anvers
(1)
Jing Yang
(6)
Jürgen Bierbrauer
(1)
Kalle Ngo
(2)
Kaoru Kurosawa
(2)
Martin Ågren
(1)
Martin Hell
(13)
Mustafa Khairallah
(1)
Navya Sivaraman
(1)
Norman Lahr
(1)
Patrik Ekdahl
(6)
Paul Stankovski
(7)
Qian Guo
(16)
Qichun Wang
(1)
Robin Leander Schröder
(1)
Rui Qi Sim
(1)
Senyang Huang
(1)
Simin Nadjm-Tehrani
(1)
Steve Babbage
(1)
Thomas Johansson
(63)
Tor Helleseth
(1)
Vladimir V. Chepyzhov
(1)
Vu Nguyen
(2)
Willi Meier
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to