×
Compute Distance To:
Author ID: johansson.thomas Recent zbMATH articles by "Johansson, Thomas"
Published as: Johansson, Thomas
Homepage: http://www.lunduniversity.lu.se/lucat/user/7694f79d8109a3426b0780699241a050
External Links: dblp

Publications by Year

Citations contained in zbMATH Open

65 Publications have been cited 393 times in 258 Documents Cited by Year
A new version of the stream cipher SNOW. Zbl 1027.68596
Ekdahl, Patrik; Johansson, Thomas
24
2003
Improved fast correlation attacks on stream ciphers via convolutional codes. Zbl 0931.94027
Johansson, Thomas; Jönsson, Fredrik
21
1999
On families of hash functions via geometric codes and concatenation. Zbl 0870.94020
Bierbrauer, Jürgen; Johansson, Thomas; Kabatianskij, Gregory; Smeets, Ben
18
1994
Fast correlation attacks through reconstruction of linear polynomials. Zbl 0995.94523
Johansson, Thomas; Jönsson, Fredrik
16
2000
A simple algorithm for fast correlation attacks on stream ciphers. Zbl 0999.94542
Chepyzhov, Vladimor V.; Johansson, Thomas; Smeets, Ben
14
2001
A framework for chosen IV statistical analysis of stream ciphers. Zbl 1153.94373
Englund, Håkan; Johansson, Thomas; Sönmez Turan, Meltem
14
2007
A construction of resilient functions with high nonlinearity. Zbl 1063.94075
Johansson, Thomas; Pasalic, Enes
13
2003
Lower bounds on the probability of deception in authentication with arbitration. Zbl 0814.94012
Johansson, Thomas
13
1994
New technique for decoding codes in the rank metric and its cryptography applications. Zbl 1026.94023
Ourivski, A. V.; Johansson, T.
12
2002
Coded-BKW: solving LWE using lattice codes. Zbl 1336.94051
Guo, Qian; Johansson, Thomas; Stankovski, Paul
12
2015
A key recovery attack on MDPC with CCA security using decoding errors. Zbl 1404.94079
Guo, Qian; Johansson, Thomas; Stankovski, Paul
11
2016
Fast correlation attacks based on turbo code techniques. Zbl 0954.94008
Johansson, Thomas; Jönsson, Fredrik
11
1999
Universal hash functions from exponential sums over finite fields and Galois rings. Zbl 1329.94062
Helleseth, Tor; Johansson, Thomas
10
1996
An overview of distinguishing attacks on stream ciphers. Zbl 1178.94189
Hell, Martin; Johansson, Thomas; Brynielsson, Lennart
10
2009
Solving LPN using covering codes. Zbl 1306.94059
Guo, Qian; Johansson, Thomas; Löndahl, Carl
9
2014
Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Zbl 1239.94002
9
2012
On the cardinality of systematic authentication codes via error-correcting codes. Zbl 0855.94016
Kabatianskij, Gregory A.; Smeets, Ben; Johansson, Thomas
9
1996
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity. Zbl 0987.94521
Pasalic, Enes; Maitra, Subhamoy; Johansson, Thomas; Sarkar, Palash
8
2001
A note on fast algebraic attacks and higher order nonlinearities. Zbl 1295.94150
Wang, Qichun; Johansson, Thomas
8
2011
Fast computation of large distributions and its cryptographic applications. Zbl 1154.94419
Maximov, Alexander; Johansson, Thomas
8
2005
On the relation between A-codes and codes correcting independent errors. Zbl 0951.94530
Johansson, Thomas; Kabatianskii, Gregory; Smeets, Ben
8
1994
Further results on the relation between nonlinearity and resiliency for Boolean functions. Zbl 0981.94071
Pasalic, Enes; Johansson, Thomas
8
1999
A shift register construction of unconditionally secure authentication codes. Zbl 0790.94011
Johansson, Thomas
6
1994
On the complexity of some cryptographic problems based on the general decoding problem. Zbl 1062.94038
Johansson, Thomas; Jönsson, Fredrik
5
2002
Almost \(k\)-wise independent sample spaces and their cryptologic applications. Zbl 1008.94017
Kurosawa, Kaoru; Johansson, Thomas; Stinson, Douglas R.
5
2001
Predicting the shrinking generator with fixed connections. Zbl 1038.94529
Ekdahl, Patrik; Meier, Willi; Johansson, Thomas
5
2003
Breaking the F-FCSR-H stream cipher in real time. Zbl 1206.94071
Hell, Martin; Johansson, Thomas
5
2008
An improved correlation attack on A5/1. Zbl 1117.94327
Maximov, Alexander; Johansson, Thomas; Babbage, Steve
5
2005
Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Zbl 1263.94005
5
2013
Further results on asymmetric authentication schemes. Zbl 1012.94012
Johansson, Thomas
4
1999
Reduced complexity correlation attacks on two clock-controlled generators. Zbl 0931.94026
Johansson, Thomas
4
1998
A fast correlation attack on LILI-128. Zbl 1032.68075
Jönsson, Fredrik; Johansson, Thomas
4
2002
Another attack on A5/1. Zbl 1063.94072
Ekdahl, Patrik; Johansson, Thomas
4
2003
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension. Zbl 1402.94064
Löndahl, Carl; Johansson, Thomas; Koochak Shooshtari, Masoumeh; Ahmadian-Attari, Mahmoud; Aref, Mohammad Reza
4
2016
A novel CCA attack using decryption errors against LAC. Zbl 1456.94080
Guo, Qian; Johansson, Thomas; Yang, Jing
4
2019
Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications. Zbl 1335.11098
Löndahl, Carl; Johansson, Thomas
4
2014
A new simple technique to attack filter generators and related ciphers. Zbl 1117.94317
Englund, Håkan; Johansson, Thomas
4
2005
Decryption failure attacks on IND-CCA secure lattice-based schemes. Zbl 07159418
D’Anvers, Jan-Pieter; Guo, Qian; Johansson, Thomas; Nilsson, Alexander; Vercauteren, Frederik; Verbauwhede, Ingrid
4
2019
Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Zbl 1029.00054
3
2003
Distinguishing attacks on SOBER-t16 and t32. Zbl 1045.94518
Ekdahl, Patrik; Johansson, Thomas
3
2002
Coded-BKW with sieving. Zbl 1420.94068
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski, Paul
3
2017
A new algorithm for solving ring-LPN with a reducible polynomial. Zbl 1359.94602
Guo, Qian; Johansson, Thomas; Löndahl, Carl
3
2015
An efficient state recovery attack on X-FCSR-256. Zbl 1248.94096
Stankovski, Paul; Hell, Martin; Johansson, Thomas
3
2009
Linear cryptanalysis of printcipher – trails and samples everywhere. Zbl 1291.94036
Ågren, Martin; Johansson, Thomas
3
2011
Improved distinguishers for HC-128. Zbl 1236.94067
Stankovski, Paul; Ruj, Sushmita; Hell, Martin; Johansson, Thomas
3
2012
On the construction of perfect authentication codes that permit arbitration. Zbl 0870.94030
Johansson, Thomas
3
1994
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time. Zbl 1258.94037
Hell, Martin; Johansson, Thomas
3
2011
Authentication codes for nontrusting parties obtained from rank metric codes. Zbl 0839.94009
Johansson, Thomas
3
1995
On the asymptotics of solving the LWE problem using coded-BKW with sieving. Zbl 1432.94134
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski Wagner, Paul
2
2019
Theoretical analysis of a correlation attack based on convolutional codes. Zbl 1062.94037
Johansson, Thomas; Jönsson, Fredrik
2
2002
A reaction attack on the QC-LDPC McEliece cryptosystem. Zbl 1437.94061
Fabšič, Tomáš; Hromada, Viliam; Stankovski, Paul; Zajac, Pavol; Guo, Qian; Johansson, Thomas
2
2017
A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences. Zbl 1351.94070
Wang, Hui; Stankovski, Paul; Johansson, Thomas
2
2015
An AEAD variant of the Grain stream cipher. Zbl 1432.94136
Hell, Martin; Johansson, Thomas; Meier, Willi; Sönnerup, Jonathan; Yoshida, Hirotaka
2
2019
Cryptanalysis of Achterbahn-version 2. Zbl 1161.94405
Hell, Martin; Johansson, Thomas
2
2007
A survey on fast correlation attacks. Zbl 1285.94037
Ågren, Martin; Löndahl, Carl; Hell, Martin; Johansson, Thomas
2
2012
Two new attacks on the self-shrinking generator. Zbl 1309.94147
Hell, Martin; Johansson, Thomas
2
2006
Construction of cryptographically important Boolean functions. Zbl 1033.94534
Maity, Soumen; Johansson, Thomas
1
2002
Correlation attacks using a new class of weak feedback polynomials. Zbl 1079.68542
Englund, Håkan; Hell, Martin; Johansson, Thomas
1
2004
Revisiting the concrete security of Goldreich’s pseudorandom generator. Zbl 1489.94114
Yang, Jing; Guo, Qian; Johansson, Thomas; Lentmaier, Michael
1
2022
Solving LPN using covering codes. Zbl 1455.94161
Guo, Qian; Johansson, Thomas; Löndahl, Carl
1
2020
An efficient state recovery attack on the X-FCSR family of stream ciphers. Zbl 1350.94051
Stankovski, Paul; Hell, Martin; Johansson, Thomas
1
2014
Cryptanalysis of Achterbahn. Zbl 1234.68091
Johansson, Thomas; Meier, Willi; Muller, Frédéric
1
2006
On equivalence classes of Boolean functions. Zbl 1339.94103
Wang, Qichun; Johansson, Thomas
1
2011
Two general attacks on Pomaranch-like keystream generators. Zbl 1186.94437
Englund, Håkan; Hell, Martin; Johansson, Thomas
1
2007
Some attacks on the bit-search generator. Zbl 1140.68389
Hell, Martin; Johansson, Thomas
1
2005
Revisiting the concrete security of Goldreich’s pseudorandom generator. Zbl 1489.94114
Yang, Jing; Guo, Qian; Johansson, Thomas; Lentmaier, Michael
1
2022
Solving LPN using covering codes. Zbl 1455.94161
Guo, Qian; Johansson, Thomas; Löndahl, Carl
1
2020
A novel CCA attack using decryption errors against LAC. Zbl 1456.94080
Guo, Qian; Johansson, Thomas; Yang, Jing
4
2019
Decryption failure attacks on IND-CCA secure lattice-based schemes. Zbl 07159418
D’Anvers, Jan-Pieter; Guo, Qian; Johansson, Thomas; Nilsson, Alexander; Vercauteren, Frederik; Verbauwhede, Ingrid
4
2019
On the asymptotics of solving the LWE problem using coded-BKW with sieving. Zbl 1432.94134
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski Wagner, Paul
2
2019
An AEAD variant of the Grain stream cipher. Zbl 1432.94136
Hell, Martin; Johansson, Thomas; Meier, Willi; Sönnerup, Jonathan; Yoshida, Hirotaka
2
2019
Coded-BKW with sieving. Zbl 1420.94068
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski, Paul
3
2017
A reaction attack on the QC-LDPC McEliece cryptosystem. Zbl 1437.94061
Fabšič, Tomáš; Hromada, Viliam; Stankovski, Paul; Zajac, Pavol; Guo, Qian; Johansson, Thomas
2
2017
A key recovery attack on MDPC with CCA security using decoding errors. Zbl 1404.94079
Guo, Qian; Johansson, Thomas; Stankovski, Paul
11
2016
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension. Zbl 1402.94064
Löndahl, Carl; Johansson, Thomas; Koochak Shooshtari, Masoumeh; Ahmadian-Attari, Mahmoud; Aref, Mohammad Reza
4
2016
Coded-BKW: solving LWE using lattice codes. Zbl 1336.94051
Guo, Qian; Johansson, Thomas; Stankovski, Paul
12
2015
A new algorithm for solving ring-LPN with a reducible polynomial. Zbl 1359.94602
Guo, Qian; Johansson, Thomas; Löndahl, Carl
3
2015
A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences. Zbl 1351.94070
Wang, Hui; Stankovski, Paul; Johansson, Thomas
2
2015
Solving LPN using covering codes. Zbl 1306.94059
Guo, Qian; Johansson, Thomas; Löndahl, Carl
9
2014
Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications. Zbl 1335.11098
Löndahl, Carl; Johansson, Thomas
4
2014
An efficient state recovery attack on the X-FCSR family of stream ciphers. Zbl 1350.94051
Stankovski, Paul; Hell, Martin; Johansson, Thomas
1
2014
Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Zbl 1263.94005
5
2013
Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Zbl 1239.94002
9
2012
Improved distinguishers for HC-128. Zbl 1236.94067
Stankovski, Paul; Ruj, Sushmita; Hell, Martin; Johansson, Thomas
3
2012
A survey on fast correlation attacks. Zbl 1285.94037
Ågren, Martin; Löndahl, Carl; Hell, Martin; Johansson, Thomas
2
2012
A note on fast algebraic attacks and higher order nonlinearities. Zbl 1295.94150
Wang, Qichun; Johansson, Thomas
8
2011
Linear cryptanalysis of printcipher – trails and samples everywhere. Zbl 1291.94036
Ågren, Martin; Johansson, Thomas
3
2011
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time. Zbl 1258.94037
Hell, Martin; Johansson, Thomas
3
2011
On equivalence classes of Boolean functions. Zbl 1339.94103
Wang, Qichun; Johansson, Thomas
1
2011
An overview of distinguishing attacks on stream ciphers. Zbl 1178.94189
Hell, Martin; Johansson, Thomas; Brynielsson, Lennart
10
2009
An efficient state recovery attack on X-FCSR-256. Zbl 1248.94096
Stankovski, Paul; Hell, Martin; Johansson, Thomas
3
2009
Breaking the F-FCSR-H stream cipher in real time. Zbl 1206.94071
Hell, Martin; Johansson, Thomas
5
2008
A framework for chosen IV statistical analysis of stream ciphers. Zbl 1153.94373
Englund, Håkan; Johansson, Thomas; Sönmez Turan, Meltem
14
2007
Cryptanalysis of Achterbahn-version 2. Zbl 1161.94405
Hell, Martin; Johansson, Thomas
2
2007
Two general attacks on Pomaranch-like keystream generators. Zbl 1186.94437
Englund, Håkan; Hell, Martin; Johansson, Thomas
1
2007
Two new attacks on the self-shrinking generator. Zbl 1309.94147
Hell, Martin; Johansson, Thomas
2
2006
Cryptanalysis of Achterbahn. Zbl 1234.68091
Johansson, Thomas; Meier, Willi; Muller, Frédéric
1
2006
Fast computation of large distributions and its cryptographic applications. Zbl 1154.94419
Maximov, Alexander; Johansson, Thomas
8
2005
An improved correlation attack on A5/1. Zbl 1117.94327
Maximov, Alexander; Johansson, Thomas; Babbage, Steve
5
2005
A new simple technique to attack filter generators and related ciphers. Zbl 1117.94317
Englund, Håkan; Johansson, Thomas
4
2005
Some attacks on the bit-search generator. Zbl 1140.68389
Hell, Martin; Johansson, Thomas
1
2005
Correlation attacks using a new class of weak feedback polynomials. Zbl 1079.68542
Englund, Håkan; Hell, Martin; Johansson, Thomas
1
2004
A new version of the stream cipher SNOW. Zbl 1027.68596
Ekdahl, Patrik; Johansson, Thomas
24
2003
A construction of resilient functions with high nonlinearity. Zbl 1063.94075
Johansson, Thomas; Pasalic, Enes
13
2003
Predicting the shrinking generator with fixed connections. Zbl 1038.94529
Ekdahl, Patrik; Meier, Willi; Johansson, Thomas
5
2003
Another attack on A5/1. Zbl 1063.94072
Ekdahl, Patrik; Johansson, Thomas
4
2003
Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Zbl 1029.00054
3
2003
New technique for decoding codes in the rank metric and its cryptography applications. Zbl 1026.94023
Ourivski, A. V.; Johansson, T.
12
2002
On the complexity of some cryptographic problems based on the general decoding problem. Zbl 1062.94038
Johansson, Thomas; Jönsson, Fredrik
5
2002
A fast correlation attack on LILI-128. Zbl 1032.68075
Jönsson, Fredrik; Johansson, Thomas
4
2002
Distinguishing attacks on SOBER-t16 and t32. Zbl 1045.94518
Ekdahl, Patrik; Johansson, Thomas
3
2002
Theoretical analysis of a correlation attack based on convolutional codes. Zbl 1062.94037
Johansson, Thomas; Jönsson, Fredrik
2
2002
Construction of cryptographically important Boolean functions. Zbl 1033.94534
Maity, Soumen; Johansson, Thomas
1
2002
A simple algorithm for fast correlation attacks on stream ciphers. Zbl 0999.94542
Chepyzhov, Vladimor V.; Johansson, Thomas; Smeets, Ben
14
2001
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity. Zbl 0987.94521
Pasalic, Enes; Maitra, Subhamoy; Johansson, Thomas; Sarkar, Palash
8
2001
Almost \(k\)-wise independent sample spaces and their cryptologic applications. Zbl 1008.94017
Kurosawa, Kaoru; Johansson, Thomas; Stinson, Douglas R.
5
2001
Fast correlation attacks through reconstruction of linear polynomials. Zbl 0995.94523
Johansson, Thomas; Jönsson, Fredrik
16
2000
Improved fast correlation attacks on stream ciphers via convolutional codes. Zbl 0931.94027
Johansson, Thomas; Jönsson, Fredrik
21
1999
Fast correlation attacks based on turbo code techniques. Zbl 0954.94008
Johansson, Thomas; Jönsson, Fredrik
11
1999
Further results on the relation between nonlinearity and resiliency for Boolean functions. Zbl 0981.94071
Pasalic, Enes; Johansson, Thomas
8
1999
Further results on asymmetric authentication schemes. Zbl 1012.94012
Johansson, Thomas
4
1999
Reduced complexity correlation attacks on two clock-controlled generators. Zbl 0931.94026
Johansson, Thomas
4
1998
Universal hash functions from exponential sums over finite fields and Galois rings. Zbl 1329.94062
Helleseth, Tor; Johansson, Thomas
10
1996
On the cardinality of systematic authentication codes via error-correcting codes. Zbl 0855.94016
Kabatianskij, Gregory A.; Smeets, Ben; Johansson, Thomas
9
1996
Authentication codes for nontrusting parties obtained from rank metric codes. Zbl 0839.94009
Johansson, Thomas
3
1995
On families of hash functions via geometric codes and concatenation. Zbl 0870.94020
Bierbrauer, Jürgen; Johansson, Thomas; Kabatianskij, Gregory; Smeets, Ben
18
1994
Lower bounds on the probability of deception in authentication with arbitration. Zbl 0814.94012
Johansson, Thomas
13
1994
On the relation between A-codes and codes correcting independent errors. Zbl 0951.94530
Johansson, Thomas; Kabatianskii, Gregory; Smeets, Ben
8
1994
A shift register construction of unconditionally secure authentication codes. Zbl 0790.94011
Johansson, Thomas
6
1994
On the construction of perfect authentication codes that permit arbitration. Zbl 0870.94030
Johansson, Thomas
3
1994
all top 5

Cited by 480 Authors

17 Johansson, Thomas
9 Sarkar, Palash
8 Meier, Willi
7 Vaudenay, Serge
7 Zhang, Bin
6 Feng, Dengguo
6 Hell, Martin
6 Maitra, Subhamoy
6 Pasalic, Enes
5 Ding, Cunsheng
5 Li, Chao
5 May, Alexander
5 Shamir, Adi
4 Bogos, Sonia
4 Dinur, Itai
4 Guo, Qian
4 Keller, Nathan
4 Qi, Wenfeng
4 Qu, Longjiang
4 Safavi-Naini, Reihaneh
4 Stankovski, Paul
4 Stinson, Douglas Robert
3 Albrecht, Martin R.
3 Carlet, Claude
3 Dunkelman, Orr
3 Fu, Shaojing
3 Hao, Yonglin
3 Kirshanova, Elena
3 Lin, Dongdai
3 Löndahl, Carl
3 Luykx, Atul
3 Mesnager, Sihem
3 Özbudak, Ferruh
3 Paul, Goutam
3 Pei, Dingyi
3 Standaert, Francois-Xavier
3 Tan, Chik How
3 Tian, Tian
3 Xu, Chao
2 Abidin, Aysajan
2 Alekseychuk, Anton Nikolaevich
2 Baldi, Marco
2 Berbain, Côme
2 Canteaut, Anne
2 Chattopadhyay, Anupam
2 Chen, Shangdi
2 Cid, Carlos Frederico
2 Climent, Joan-Josep
2 Couteau, Geoffroy
2 Demirci, Hüseyin
2 Feng, Xiutao
2 Fúster-Sabater, Amparo
2 Gilbert, Henri
2 Gong, Xinxin
2 Harmanci, A. Emre
2 Hermelin, Miia
2 Hu, Lei
2 Hu, Yupu
2 Huguenin-Dumittan, Loïs
2 Imai, Hideki
2 Ishai, Yuval
2 Kanukurthi, Bhavana
2 Karakoç, Ferhat
2 Khalid, Ayesha
2 Koniushok, S. M.
2 Kumar, Arvind
2 Larsson, Jan-Åke
2 Li, Hongwei
2 Liang, Miao
2 Lin, Zhiqiang
2 Lu, Yi
2 Mishra, Prasanna Raghaw
2 Naya-Plasencia, María
2 Nyberg, Kaisa
2 Ojjela, Odelu
2 Persichetti, Edoardo
2 Phan, Raphael Chung-Wei
2 Poremskyi, M. V.
2 Pousse, Benjamin
2 Procter, Gordon
2 Requena, Verónica
2 Rotella, Yann
2 Salomaa, Arto Kustaa
2 Santini, Paolo Maria
2 Saygı, Zülfükar
2 Sen Gupta, Sourav
2 Sendrier, Nicolas
2 Singh, Brajesh Kumar
2 Tang, Deng
2 Wang, Huaxiong
2 Wang, Jinhua
2 Wang, Qichun
2 Wang, Xiaojuan
2 Wei, Yongzhuang
2 Yan, Haode
2 Yellapu, Ganesh
2 Zhang, Fengrong
2 Zhang, Huanguo
2 Zhou, Yu
2 Zhou, Zhengchun
...and 380 more Authors
all top 5

Cited in 60 Serials

35 Designs, Codes and Cryptography
25 Cryptography and Communications
17 Journal of Cryptology
7 Information Processing Letters
5 Discrete Applied Mathematics
4 Theoretical Computer Science
4 Journal of Discrete Mathematical Sciences & Cryptography
4 Quantum Information Processing
4 Journal of Mathematical Cryptology
4 Advances in Mathematics of Communications
3 Information Sciences
3 International Journal of Computer Mathematics
3 Finite Fields and their Applications
3 Prikladnaya Diskretnaya Matematika
3 Matematicheskie Voprosy Kriptografii
2 Discrete Mathematics
2 Acta Applicandae Mathematicae
2 Information and Computation
2 Cybernetics and Systems Analysis
2 Journal of Systems Science and Complexity
2 Mathematics in Computer Science
2 Frontiers of Computer Science in China
1 International Journal of Theoretical Physics
1 Physics Letters. A
1 Problems of Information Transmission
1 Applied Mathematics and Computation
1 Journal of Pure and Applied Algebra
1 Journal of Statistical Planning and Inference
1 SIAM Journal on Computing
1 Cryptologia
1 European Journal of Combinatorics
1 Chinese Annals of Mathematics. Series B
1 Acta Mathematica Hungarica
1 Acta Mathematicae Applicatae Sinica. English Series
1 Journal of Symbolic Computation
1 Journal of Complexity
1 Random Structures & Algorithms
1 International Journal of Foundations of Computer Science
1 Applicable Algebra in Engineering, Communication and Computing
1 SIAM Journal on Optimization
1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
1 Applied Mathematics. Series B (English Edition)
1 Journal of Combinatorial Designs
1 Nonlinear Dynamics
1 Journal of Combinatorial Optimization
1 Wuhan University Journal of Natural Sciences (WUJNS)
1 Communications in Nonlinear Science and Numerical Simulation
1 International Journal of Applied Mathematics and Computer Science
1 Journal of Applied Mathematics and Computing
1 Science in China. Series F
1 Annales Universitatis Mariae Curie-Skłodowska. Sectio A1. Informatica
1 Foundations and Trends in Communications and Information Theory
1
1 Science China. Information Sciences
1 Symmetry
1 Diskretnyĭ Analiz i Issledovanie Operatsiĭ
1 S\(\vec{\text{e}}\)MA Journal
1 International Journal of Engineering Mathematics
1 Open Mathematics
1 SIAM Journal on Applied Algebra and Geometry

Citations by Year