Johansson, Thomas Analysis and design of modern stream ciphers. (Abstract). (English) Zbl 1123.94349 Paterson, Kenneth G. (ed.), Cryptography and coding. 9th IMA international conference, Cirencester, UK, December 16–18, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20663-9/pbk). Lect. Notes Comput. Sci. 2898, 66 (2003). MSC: 94A60 94A55 PDFBibTeX XMLCite \textit{T. Johansson}, Lect. Notes Comput. Sci. 2898, 66 (2003; Zbl 1123.94349) Full Text: DOI
Johansson, Thomas (ed.) Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. (English) Zbl 1029.00054 Lecture Notes in Computer Science. 2887. Berlin: Springer. ix, 397 p. (2003). MSC: 00B25 68-06 94-06 68N99 68P25 94A60 PDFBibTeX XMLCite \textit{T. Johansson} (ed.), Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24--26, 2003. Revised papers. Berlin: Springer (2003; Zbl 1029.00054) Full Text: DOI Link
Johansson, Thomas Further results on asymmetric authentication schemes. (English) Zbl 1012.94012 Inf. Comput. 151, No. 1-2, 100-133 (1999). MSC: 94A60 68P25 94A62 PDFBibTeX XMLCite \textit{T. Johansson}, Inf. Comput. 151, No. 1--2, 100--133 (1999; Zbl 1012.94012) Full Text: DOI Link
Johansson, Thomas Reduced complexity correlation attacks on two clock-controlled generators. (English) Zbl 0931.94026 Ohta, Kazuo (ed.) et al., Advances in cryptology - ASIACRYPT ’98. International conference on the Theory and application of cryptology and information security, Beijing, China, October 18–22, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1514, 342-356 (1998). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Johansson}, Lect. Notes Comput. Sci. 1514, 342--356 (1998; Zbl 0931.94026)
Johansson, Thomas Authentication codes for nontrusting parties obtained from rank metric codes. (English) Zbl 0839.94009 Des. Codes Cryptography 6, No. 3, 205-218 (1995). Reviewer: A.Sgarro (Trieste) MSC: 94A60 94B60 PDFBibTeX XMLCite \textit{T. Johansson}, Des. Codes Cryptography 6, No. 3, 205--218 (1995; Zbl 0839.94009) Full Text: DOI
Johansson, Thomas Lower bounds on the probability of deception in authentication with arbitration. (English) Zbl 0814.94012 IEEE Trans. Inf. Theory 40, No. 5, 1573-1585 (1994). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{T. Johansson}, IEEE Trans. Inf. Theory 40, No. 5, 1573--1585 (1994; Zbl 0814.94012) Full Text: DOI Link
Johansson, Thomas A shift register construction of unconditionally secure authentication codes. (English) Zbl 0790.94011 Des. Codes Cryptography 4, No. 1, 69-81 (1994). MSC: 94A55 94A60 PDFBibTeX XMLCite \textit{T. Johansson}, Des. Codes Cryptography 4, No. 1, 69--81 (1994; Zbl 0790.94011) Full Text: DOI
Johansson, Thomas On the construction of perfect authentication codes that permit arbitration. (English) Zbl 0870.94030 Stinson, Douglas R. (ed.), Advances in cryptology - CRYPTO ’93. 13th annual international cryptology conference, Santa Barbara, CA, USA, August 22 - 26, 1993. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 773, 343-354 (1994). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Johansson}, Lect. Notes Comput. Sci. 773, 343--354 (1994; Zbl 0870.94030)