×

zbMATH — the first resource for mathematics

Johansson, Thomas

Compute Distance To:
Author ID: johansson.thomas Recent zbMATH articles by "Johansson, Thomas"
Published as: Johansson, T.; Johansson, Thomas
Homepage: http://www.lunduniversity.lu.se/lucat/user/7694f79d8109a3426b0780699241a050
External Links: dblp
Documents Indexed: 81 Publications since 1994, including 4 Books

Publications by Year

Citations contained in zbMATH Open

58 Publications have been cited 313 times in 212 Documents Cited by Year
A new version of the stream cipher SNOW. Zbl 1027.68596
Ekdahl, Patrik; Johansson, Thomas
22
2003
Improved fast correlation attacks on stream ciphers via convolutional codes. Zbl 0931.94027
Johansson, Thomas; Jönsson, Fredrik
17
1999
On families of hash functions via geometric codes and concatenation. Zbl 0870.94020
Bierbrauer, Jürgen; Johansson, Thomas; Kabatianskij, Gregory; Smeets, Ben
14
1994
A framework for chosen IV statistical analysis of stream ciphers. Zbl 1153.94373
Englund, Håkan; Johansson, Thomas; Sönmez Turan, Meltem
13
2007
Fast correlation attacks through reconstruction of linear polynomials. Zbl 0995.94523
Johansson, Thomas; Jönsson, Fredrik
13
2000
Lower bounds on the probability of deception in authentication with arbitration. Zbl 0814.94012
Johansson, Thomas
13
1994
A construction of resilient functions with high nonlinearity. Zbl 1063.94075
Johansson, Thomas; Pasalic, Enes
12
2003
A simple algorithm for fast correlation attacks on stream ciphers. Zbl 0999.94542
Chepyzhov, Vladimor V.; Johansson, Thomas; Smeets, Ben
11
2001
A note on fast algebraic attacks and higher order nonlinearities. Zbl 1295.94150
Wang, Qichun; Johansson, Thomas
9
2011
New technique for decoding codes in the rank metric and its cryptography applications. Zbl 1026.94023
Ourivski, A. V.; Johansson, T.
9
2002
Fast correlation attacks based on turbo code techniques. Zbl 0954.94008
Johansson, Thomas; Jönsson, Fredrik
9
1999
Universal hash functions from exponential sums over finite fields and Galois rings. Zbl 1329.94062
Helleseth, Tor; Johansson, Thomas
9
1996
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity. Zbl 0987.94521
Pasalic, Enes; Maitra, Subhamoy; Johansson, Thomas; Sarkar, Palash
8
2001
On the cardinality of systematic authentication codes via error-correcting codes. Zbl 0855.94016
Kabatianskij, Gregory A.; Smeets, Ben; Johansson, Thomas
8
1996
On the relation between A-codes and codes correcting independent errors. Zbl 0951.94530
Johansson, Thomas; Kabatianskii, Gregory; Smeets, Ben
8
1994
Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Zbl 1239.94002
Pointcheval, David (ed.); Johansson, Thomas (ed.)
7
2012
Fast computation of large distributions and its cryptographic applications. Zbl 1154.94419
Maximov, Alexander; Johansson, Thomas
7
2005
Further results on the relation between nonlinearity and resiliency for Boolean functions. Zbl 0981.94071
Pasalic, Enes; Johansson, Thomas
7
1999
A shift register construction of unconditionally secure authentication codes. Zbl 0790.94011
Johansson, Thomas
7
1994
An overview of distinguishing attacks on stream ciphers. Zbl 1178.94189
Hell, Martin; Johansson, Thomas; Brynielsson, Lennart
6
2009
Coded-BKW: solving LWE using lattice codes. Zbl 1336.94051
Guo, Qian; Johansson, Thomas; Stankovski, Paul
5
2015
Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Zbl 1263.94005
Johansson, Thomas (ed.); Nguyen, Phong Q. (ed.)
5
2013
Breaking the F-FCSR-H stream cipher in real time. Zbl 1206.94071
Hell, Martin; Johansson, Thomas
5
2008
Predicting the shrinking generator with fixed connections. Zbl 1038.94529
Ekdahl, Patrik; Meier, Willi; Johansson, Thomas
5
2003
Reduced complexity correlation attacks on two clock-controlled generators. Zbl 0931.94026
Johansson, Thomas
5
1998
Solving LPN using covering codes. Zbl 1306.94059
Guo, Qian; Johansson, Thomas; Löndahl, Carl
4
2014
A new simple technique to attack filter generators and related ciphers. Zbl 1117.94317
Englund, Håkan; Johansson, Thomas
4
2005
On the complexity of some cryptographic problems based on the general decoding problem. Zbl 1062.94038
Johansson, Thomas; Jönsson, Fredrik
4
2002
Almost \(k\)-wise independent sample spaces and their cryptologic applications. Zbl 1008.94017
Kurosawa, Kaoru; Johansson, Thomas; Stinson, Douglas R.
4
2001
Further results on asymmetric authentication schemes. Zbl 1012.94012
Johansson, Thomas
4
1999
On the construction of perfect authentication codes that permit arbitration. Zbl 0870.94030
Johansson, Thomas
4
1994
A key recovery attack on MDPC with CCA security using decoding errors. Zbl 1404.94079
Guo, Qian; Johansson, Thomas; Stankovski, Paul
3
2016
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension. Zbl 1402.94064
Löndahl, Carl; Johansson, Thomas; Koochak Shooshtari, Masoumeh; Ahmadian-Attari, Mahmoud; Aref, Mohammad Reza
3
2016
A new algorithm for solving ring-LPN with a reducible polynomial. Zbl 1359.94602
Guo, Qian; Johansson, Thomas; Löndahl, Carl
3
2015
Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications. Zbl 1335.11098
Löndahl, Carl; Johansson, Thomas
3
2014
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time. Zbl 1258.94037
Hell, Martin; Johansson, Thomas
3
2011
An efficient state recovery attack on X-FCSR-256. Zbl 1248.94096
Stankovski, Paul; Hell, Martin; Johansson, Thomas
3
2009
An improved correlation attack on A5/1. Zbl 1117.94327
Maximov, Alexander; Johansson, Thomas; Babbage, Steve
3
2005
Another attack on A5/1. Zbl 1063.94072
Ekdahl, Patrik; Johansson, Thomas
3
2003
Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Zbl 1029.00054
Johansson, Thomas (ed.)
3
2003
Distinguishing attacks on SOBER-t16 and t32. Zbl 1045.94518
Ekdahl, Patrik; Johansson, Thomas
3
2002
A fast correlation attack on LILI-128. Zbl 1032.68075
Jönsson, Fredrik; Johansson, Thomas
3
2002
Authentication codes for nontrusting parties obtained from rank metric codes. Zbl 0839.94009
Johansson, Thomas
3
1995
A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences. Zbl 1351.94070
Wang, Hui; Stankovski, Paul; Johansson, Thomas
2
2015
Linear cryptanalysis of printcipher – trails and samples everywhere. Zbl 1291.94036
Ågren, Martin; Johansson, Thomas
2
2011
Cryptanalysis of Achterbahn-version 2. Zbl 1161.94405
Hell, Martin; Johansson, Thomas
2
2007
Two new attacks on the self-shrinking generator. Zbl 1309.94147
Hell, Martin; Johansson, Thomas
2
2006
A reaction attack on the QC-LDPC McEliece cryptosystem. Zbl 1437.94061
Fabšič, Tomáš; Hromada, Viliam; Stankovski, Paul; Zajac, Pavol; Guo, Qian; Johansson, Thomas
1
2017
Coded-BKW with sieving. Zbl 1420.94068
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski, Paul
1
2017
An efficient state recovery attack on the X-FCSR family of stream ciphers. Zbl 1350.94051
Stankovski, Paul; Hell, Martin; Johansson, Thomas
1
2014
A survey on fast correlation attacks. Zbl 1285.94037
Ågren, Martin; Löndahl, Carl; Hell, Martin; Johansson, Thomas
1
2012
Improved distinguishers for HC-128. Zbl 1236.94067
Stankovski, Paul; Ruj, Sushmita; Hell, Martin; Johansson, Thomas
1
2012
Two general attacks on Pomaranch-like keystream generators. Zbl 1186.94437
Englund, Håkan; Hell, Martin; Johansson, Thomas
1
2007
Cryptanalysis of Achterbahn. Zbl 1234.68091
Johansson, Thomas; Meier, Willi; Muller, Frédéric
1
2006
Some attacks on the bit-search generator. Zbl 1140.68389
Hell, Martin; Johansson, Thomas
1
2005
Correlation attacks using a new class of weak feedback polynomials. Zbl 1079.68542
Englund, Håkan; Hell, Martin; Johansson, Thomas
1
2004
Theoretical analysis of a correlation attack based on convolutional codes. Zbl 1062.94037
Johansson, Thomas; Jönsson, Fredrik
1
2002
Construction of cryptographically important Boolean functions. Zbl 1033.94534
Maity, Soumen; Johansson, Thomas
1
2002
A reaction attack on the QC-LDPC McEliece cryptosystem. Zbl 1437.94061
Fabšič, Tomáš; Hromada, Viliam; Stankovski, Paul; Zajac, Pavol; Guo, Qian; Johansson, Thomas
1
2017
Coded-BKW with sieving. Zbl 1420.94068
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski, Paul
1
2017
A key recovery attack on MDPC with CCA security using decoding errors. Zbl 1404.94079
Guo, Qian; Johansson, Thomas; Stankovski, Paul
3
2016
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension. Zbl 1402.94064
Löndahl, Carl; Johansson, Thomas; Koochak Shooshtari, Masoumeh; Ahmadian-Attari, Mahmoud; Aref, Mohammad Reza
3
2016
Coded-BKW: solving LWE using lattice codes. Zbl 1336.94051
Guo, Qian; Johansson, Thomas; Stankovski, Paul
5
2015
A new algorithm for solving ring-LPN with a reducible polynomial. Zbl 1359.94602
Guo, Qian; Johansson, Thomas; Löndahl, Carl
3
2015
A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences. Zbl 1351.94070
Wang, Hui; Stankovski, Paul; Johansson, Thomas
2
2015
Solving LPN using covering codes. Zbl 1306.94059
Guo, Qian; Johansson, Thomas; Löndahl, Carl
4
2014
Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications. Zbl 1335.11098
Löndahl, Carl; Johansson, Thomas
3
2014
An efficient state recovery attack on the X-FCSR family of stream ciphers. Zbl 1350.94051
Stankovski, Paul; Hell, Martin; Johansson, Thomas
1
2014
Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Zbl 1263.94005
Johansson, Thomas (ed.); Nguyen, Phong Q. (ed.)
5
2013
Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Zbl 1239.94002
Pointcheval, David (ed.); Johansson, Thomas (ed.)
7
2012
A survey on fast correlation attacks. Zbl 1285.94037
Ågren, Martin; Löndahl, Carl; Hell, Martin; Johansson, Thomas
1
2012
Improved distinguishers for HC-128. Zbl 1236.94067
Stankovski, Paul; Ruj, Sushmita; Hell, Martin; Johansson, Thomas
1
2012
A note on fast algebraic attacks and higher order nonlinearities. Zbl 1295.94150
Wang, Qichun; Johansson, Thomas
9
2011
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time. Zbl 1258.94037
Hell, Martin; Johansson, Thomas
3
2011
Linear cryptanalysis of printcipher – trails and samples everywhere. Zbl 1291.94036
Ågren, Martin; Johansson, Thomas
2
2011
An overview of distinguishing attacks on stream ciphers. Zbl 1178.94189
Hell, Martin; Johansson, Thomas; Brynielsson, Lennart
6
2009
An efficient state recovery attack on X-FCSR-256. Zbl 1248.94096
Stankovski, Paul; Hell, Martin; Johansson, Thomas
3
2009
Breaking the F-FCSR-H stream cipher in real time. Zbl 1206.94071
Hell, Martin; Johansson, Thomas
5
2008
A framework for chosen IV statistical analysis of stream ciphers. Zbl 1153.94373
Englund, Håkan; Johansson, Thomas; Sönmez Turan, Meltem
13
2007
Cryptanalysis of Achterbahn-version 2. Zbl 1161.94405
Hell, Martin; Johansson, Thomas
2
2007
Two general attacks on Pomaranch-like keystream generators. Zbl 1186.94437
Englund, Håkan; Hell, Martin; Johansson, Thomas
1
2007
Two new attacks on the self-shrinking generator. Zbl 1309.94147
Hell, Martin; Johansson, Thomas
2
2006
Cryptanalysis of Achterbahn. Zbl 1234.68091
Johansson, Thomas; Meier, Willi; Muller, Frédéric
1
2006
Fast computation of large distributions and its cryptographic applications. Zbl 1154.94419
Maximov, Alexander; Johansson, Thomas
7
2005
A new simple technique to attack filter generators and related ciphers. Zbl 1117.94317
Englund, Håkan; Johansson, Thomas
4
2005
An improved correlation attack on A5/1. Zbl 1117.94327
Maximov, Alexander; Johansson, Thomas; Babbage, Steve
3
2005
Some attacks on the bit-search generator. Zbl 1140.68389
Hell, Martin; Johansson, Thomas
1
2005
Correlation attacks using a new class of weak feedback polynomials. Zbl 1079.68542
Englund, Håkan; Hell, Martin; Johansson, Thomas
1
2004
A new version of the stream cipher SNOW. Zbl 1027.68596
Ekdahl, Patrik; Johansson, Thomas
22
2003
A construction of resilient functions with high nonlinearity. Zbl 1063.94075
Johansson, Thomas; Pasalic, Enes
12
2003
Predicting the shrinking generator with fixed connections. Zbl 1038.94529
Ekdahl, Patrik; Meier, Willi; Johansson, Thomas
5
2003
Another attack on A5/1. Zbl 1063.94072
Ekdahl, Patrik; Johansson, Thomas
3
2003
Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Zbl 1029.00054
Johansson, Thomas (ed.)
3
2003
New technique for decoding codes in the rank metric and its cryptography applications. Zbl 1026.94023
Ourivski, A. V.; Johansson, T.
9
2002
On the complexity of some cryptographic problems based on the general decoding problem. Zbl 1062.94038
Johansson, Thomas; Jönsson, Fredrik
4
2002
Distinguishing attacks on SOBER-t16 and t32. Zbl 1045.94518
Ekdahl, Patrik; Johansson, Thomas
3
2002
A fast correlation attack on LILI-128. Zbl 1032.68075
Jönsson, Fredrik; Johansson, Thomas
3
2002
Theoretical analysis of a correlation attack based on convolutional codes. Zbl 1062.94037
Johansson, Thomas; Jönsson, Fredrik
1
2002
Construction of cryptographically important Boolean functions. Zbl 1033.94534
Maity, Soumen; Johansson, Thomas
1
2002
A simple algorithm for fast correlation attacks on stream ciphers. Zbl 0999.94542
Chepyzhov, Vladimor V.; Johansson, Thomas; Smeets, Ben
11
2001
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity. Zbl 0987.94521
Pasalic, Enes; Maitra, Subhamoy; Johansson, Thomas; Sarkar, Palash
8
2001
Almost \(k\)-wise independent sample spaces and their cryptologic applications. Zbl 1008.94017
Kurosawa, Kaoru; Johansson, Thomas; Stinson, Douglas R.
4
2001
Fast correlation attacks through reconstruction of linear polynomials. Zbl 0995.94523
Johansson, Thomas; Jönsson, Fredrik
13
2000
Improved fast correlation attacks on stream ciphers via convolutional codes. Zbl 0931.94027
Johansson, Thomas; Jönsson, Fredrik
17
1999
Fast correlation attacks based on turbo code techniques. Zbl 0954.94008
Johansson, Thomas; Jönsson, Fredrik
9
1999
Further results on the relation between nonlinearity and resiliency for Boolean functions. Zbl 0981.94071
Pasalic, Enes; Johansson, Thomas
7
1999
Further results on asymmetric authentication schemes. Zbl 1012.94012
Johansson, Thomas
4
1999
Reduced complexity correlation attacks on two clock-controlled generators. Zbl 0931.94026
Johansson, Thomas
5
1998
Universal hash functions from exponential sums over finite fields and Galois rings. Zbl 1329.94062
Helleseth, Tor; Johansson, Thomas
9
1996
On the cardinality of systematic authentication codes via error-correcting codes. Zbl 0855.94016
Kabatianskij, Gregory A.; Smeets, Ben; Johansson, Thomas
8
1996
Authentication codes for nontrusting parties obtained from rank metric codes. Zbl 0839.94009
Johansson, Thomas
3
1995
On families of hash functions via geometric codes and concatenation. Zbl 0870.94020
Bierbrauer, Jürgen; Johansson, Thomas; Kabatianskij, Gregory; Smeets, Ben
14
1994
Lower bounds on the probability of deception in authentication with arbitration. Zbl 0814.94012
Johansson, Thomas
13
1994
On the relation between A-codes and codes correcting independent errors. Zbl 0951.94530
Johansson, Thomas; Kabatianskii, Gregory; Smeets, Ben
8
1994
A shift register construction of unconditionally secure authentication codes. Zbl 0790.94011
Johansson, Thomas
7
1994
On the construction of perfect authentication codes that permit arbitration. Zbl 0870.94030
Johansson, Thomas
4
1994
all top 5

Cited by 400 Authors

15 Johansson, Thomas
9 Sarkar, Palash
6 Maitra, Subhamoy
6 Pasalic, Enes
5 Ding, Cunsheng
5 Hell, Martin
5 Li, Chao
5 Meier, Willi
5 Shamir, Adi
5 Zhang, Bin
4 Carlet, Claude
4 Keller, Nathan
4 Qu, Longjiang
4 Safavi-Naini, Reihaneh
4 Stankovski, Paul
4 Stinson, Douglas Robert
4 Tan, Chik How
4 Vaudenay, Serge
3 Bogos, Sonia
3 Dinur, Itai
3 Dunkelman, Orr
3 Faugère, Jean-Charles
3 Feng, Dengguo
3 Fu, Shaojing
3 Fúster-Sabater, Amparo
3 Guo, Qian
3 Löndahl, Carl
3 Mesnager, Sihem
3 Özbudak, Ferruh
3 Paul, Goutam
3 Pei, Dingyi
3 Standaert, Francois-Xavier
3 Stănică, Pantelimon
3 Wang, Qichun
2 Abidin, Aysajan
2 Albrecht, Martin R.
2 Alekseychuk, Anton Nikolaevich
2 Berbain, Côme
2 Caballero-Gil, Pino
2 Canteaut, Anne
2 Charnes, Chris
2 Chattopadhyay, Anupam
2 Chen, Shangdi
2 Climent, Joan-Josep
2 Demirci, Hüseyin
2 Feng, Xiutao
2 Gangopadhyay, Sugata
2 Gilbert, Henri
2 Harmanci, A. Emre
2 Hermelin, Miia
2 Hu, Lei
2 Hu, Yupu
2 Imai, Hideki
2 Kanukurthi, Bhavana
2 Karakoç, Ferhat
2 Khalid, Ayesha
2 Kirshanova, Elena
2 Koniushok, S. M.
2 Larsson, Jan-Åke
2 Liang, Miao
2 Lin, Dongdai
2 Lin, Zhiqiang
2 Lu, Yi
2 Luykx, Atul
2 May, Alexander
2 Naya-Plasencia, María
2 Nyberg, Kaisa
2 Phan, Raphael Chung-Wei
2 Poremskyi, M. V.
2 Pousse, Benjamin
2 Qi, Wenfeng
2 Requena, Verónica
2 Rotella, Yann
2 Safey El Din, Mohab
2 Salomaa, Arto Kustaa
2 Saygı, Zülfükar
2 Sen Gupta, Sourav
2 Singh, Brajesh Kumar
2 Spaenlehauer, Pierre-Jean
2 Tang, Deng
2 Wang, Huaxiong
2 Wang, Jinhua
2 Xu, Chao
2 Yan, Haode
2 Zhou, Zhengchun
2 Zhu, Lie
1 Afanassiev, Valentine B.
1 Ågren, Martin
1 Ahmed Khan, Mansoor
1 Alawida, Moatsum
1 Alomair, Basel
1 Alshoura, Wafa’ Hamdan
1 Álvarez-Cubero, José Antonio
1 Aref, Mohammad Reza
1 Arnault, François
1 Assidi, Hafsa
1 Atici, Mustafa
1 Attari, Mahmoud Ahmadian
1 Aumasson, Jean-Philippe
1 Ayebie, Berenger Edoukou
...and 300 more Authors
all top 5

Cited in 55 Serials

33 Designs, Codes and Cryptography
24 Cryptography and Communications
17 Journal of Cryptology
8 Information Processing Letters
6 Discrete Applied Mathematics
4 Theoretical Computer Science
4 Journal of Symbolic Computation
4 Quantum Information Processing
3 Information Sciences
3 International Journal of Computer Mathematics
3 Advances in Mathematics of Communications
3 Prikladnaya Diskretnaya Matematika
2 Discrete Mathematics
2 Problems of Information Transmission
2 Acta Applicandae Mathematicae
2 Information and Computation
2 Cybernetics and Systems Analysis
2 Finite Fields and their Applications
2 Journal of Systems Science and Complexity
2 Mathematics in Computer Science
2 Journal of Mathematical Cryptology
2 Frontiers of Computer Science in China
1 Computers & Mathematics with Applications
1 Mathematical Biosciences
1 Physics Letters. A
1 Applied Mathematics and Computation
1 Journal of Pure and Applied Algebra
1 Journal of Statistical Planning and Inference
1 SIAM Journal on Computing
1 Cryptologia
1 European Journal of Combinatorics
1 Chinese Annals of Mathematics. Series B
1 Acta Mathematica Hungarica
1 Acta Mathematicae Applicatae Sinica. English Series
1 Journal of Complexity
1 Random Structures & Algorithms
1 International Journal of Foundations of Computer Science
1 Applicable Algebra in Engineering, Communication and Computing
1 SIAM Journal on Optimization
1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
1 Applied Mathematics. Series B (English Edition)
1 Journal of Combinatorial Designs
1 Nonlinear Dynamics
1 Journal of Combinatorial Optimization
1 Wuhan University Journal of Natural Sciences (WUJNS)
1 Communications in Nonlinear Science and Numerical Simulation
1 International Journal of Applied Mathematics and Computer Science
1 Journal of Applied Mathematics and Computing
1 Annales Universitatis Mariae Curie-Skłodowska. Sectio A1. Informatica
1
1 Science China. Information Sciences
1 Symmetry
1 S\(\vec{\text{e}}\)MA Journal
1 International Journal of Engineering Mathematics
1 Open Mathematics

Citations by Year