×
Author ID: johansson.thomas Recent zbMATH articles by "Johansson, Thomas"
Published as: Johansson, Thomas
Homepage: http://www.lunduniversity.lu.se/lucat/user/7694f79d8109a3426b0780699241a050
External Links: dblp

Publications by Year

Citations contained in zbMATH Open

75 Publications have been cited 539 times in 352 Documents Cited by Year
A new version of the stream cipher SNOW. Zbl 1027.68596
Ekdahl, Patrik; Johansson, Thomas
33
2003
New technique for decoding codes in the rank metric and its cryptography applications. Zbl 1026.94023
Ourivski, A. V.; Johansson, T.
22
2002
On families of hash functions via geometric codes and concatenation. Zbl 0870.94020
Bierbrauer, Jürgen; Johansson, Thomas; Kabatianskij, Gregory; Smeets, Ben
22
1994
Improved fast correlation attacks on stream ciphers via convolutional codes. Zbl 0931.94027
Johansson, Thomas; Jönsson, Fredrik
21
1999
A key recovery attack on MDPC with CCA security using decoding errors. Zbl 1404.94079
Guo, Qian; Johansson, Thomas; Stankovski, Paul
20
2016
Fast correlation attacks through reconstruction of linear polynomials. Zbl 0995.94523
Johansson, Thomas; Jönsson, Fredrik
18
2000
A simple algorithm for fast correlation attacks on stream ciphers. Zbl 0999.94542
Chepyzhov, Vladimor V.; Johansson, Thomas; Smeets, Ben
18
2001
A framework for chosen IV statistical analysis of stream ciphers. Zbl 1153.94373
Englund, Håkan; Johansson, Thomas; Sönmez Turan, Meltem
17
2007
A construction of resilient functions with high nonlinearity. Zbl 1063.94075
Johansson, Thomas; Pasalic, Enes
14
2003
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity. Zbl 0987.94521
Pasalic, Enes; Maitra, Subhamoy; Johansson, Thomas; Sarkar, Palash
14
2001
Lower bounds on the probability of deception in authentication with arbitration. Zbl 0814.94012
Johansson, Thomas
14
1994
Coded-BKW: solving LWE using lattice codes. Zbl 1336.94051
Guo, Qian; Johansson, Thomas; Stankovski, Paul
14
2015
Fast correlation attacks based on turbo code techniques. Zbl 0954.94008
Johansson, Thomas; Jönsson, Fredrik
12
1999
Decryption failure attacks on IND-CCA secure lattice-based schemes. Zbl 1509.94082
D’Anvers, Jan-Pieter; Guo, Qian; Johansson, Thomas; Nilsson, Alexander; Vercauteren, Frederik; Verbauwhede, Ingrid
12
2019
Fast computation of large distributions and its cryptographic applications. Zbl 1154.94419
Maximov, Alexander; Johansson, Thomas
12
2005
Solving LPN using covering codes. Zbl 1306.94059
Guo, Qian; Johansson, Thomas; Löndahl, Carl
12
2014
On the cardinality of systematic authentication codes via error-correcting codes. Zbl 0855.94016
Kabatianskij, Gregory A.; Smeets, Ben; Johansson, Thomas
11
1996
An overview of distinguishing attacks on stream ciphers. Zbl 1178.94189
Hell, Martin; Johansson, Thomas; Brynielsson, Lennart
11
2009
Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Zbl 1239.94002
11
2012
A novel CCA attack using decryption errors against LAC. Zbl 1456.94080
Guo, Qian; Johansson, Thomas; Yang, Jing
11
2019
A note on fast algebraic attacks and higher order nonlinearities. Zbl 1295.94150
Wang, Qichun; Johansson, Thomas
11
2011
On the relation between A-codes and codes correcting independent errors. Zbl 0951.94530
Johansson, Thomas; Kabatianskii, Gregory; Smeets, Ben
10
1994
Universal hash functions from exponential sums over finite fields and Galois rings. Zbl 1329.94062
Helleseth, Tor; Johansson, Thomas
10
1996
Further results on the relation between nonlinearity and resiliency for Boolean functions. Zbl 0981.94071
Pasalic, Enes; Johansson, Thomas
9
1999
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM. Zbl 1504.94144
Guo, Qian; Johansson, Thomas; Nilsson, Alexander
9
2020
On the complexity of some cryptographic problems based on the general decoding problem. Zbl 1062.94038
Johansson, Thomas; Jönsson, Fredrik
8
2002
Almost \(k\)-wise independent sample spaces and their cryptologic applications. Zbl 1008.94017
Kurosawa, Kaoru; Johansson, Thomas; Stinson, Douglas R.
8
2001
A reaction attack on the QC-LDPC McEliece cryptosystem. Zbl 1437.94061
Fabšič, Tomáš; Hromada, Viliam; Stankovski, Paul; Zajac, Pavol; Guo, Qian; Johansson, Thomas
8
2017
Solving LPN using covering codes. Zbl 1455.94161
Guo, Qian; Johansson, Thomas; Löndahl, Carl
8
2020
Reduced complexity correlation attacks on two clock-controlled generators. Zbl 0931.94026
Johansson, Thomas
7
1998
A shift register construction of unconditionally secure authentication codes. Zbl 0790.94011
Johansson, Thomas
7
1994
An improved correlation attack on A5/1. Zbl 1117.94327
Maximov, Alexander; Johansson, Thomas; Babbage, Steve
7
2005
An AEAD variant of the Grain stream cipher. Zbl 1432.94136
Hell, Martin; Johansson, Thomas; Meier, Willi; Sönnerup, Jonathan; Yoshida, Hirotaka
7
2019
Predicting the shrinking generator with fixed connections. Zbl 1038.94529
Ekdahl, Patrik; Meier, Willi; Johansson, Thomas
6
2003
Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Zbl 1263.94005
6
2013
Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications. Zbl 1335.11098
Löndahl, Carl; Johansson, Thomas
5
2014
Another attack on A5/1. Zbl 1063.94072
Ekdahl, Patrik; Johansson, Thomas
5
2003
A new simple technique to attack filter generators and related ciphers. Zbl 1117.94317
Englund, Håkan; Johansson, Thomas
5
2005
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension. Zbl 1402.94064
Löndahl, Carl; Johansson, Thomas; Koochak Shooshtari, Masoumeh; Ahmadian-Attari, Mahmoud; Aref, Mohammad Reza
5
2016
Cryptanalysis of Achterbahn-version 2. Zbl 1161.94405
Hell, Martin; Johansson, Thomas
5
2007
Breaking the F-FCSR-H stream cipher in real time. Zbl 1206.94071
Hell, Martin; Johansson, Thomas
5
2008
A new algorithm for solving ring-LPN with a reducible polynomial. Zbl 1359.94602
Guo, Qian; Johansson, Thomas; Löndahl, Carl
5
2015
Further results on asymmetric authentication schemes. Zbl 1012.94012
Johansson, Thomas
4
1999
Distinguishing attacks on SOBER-t16 and t32. Zbl 1045.94518
Ekdahl, Patrik; Johansson, Thomas
4
2002
A fast correlation attack on LILI-128. Zbl 1032.68075
Jönsson, Fredrik; Johansson, Thomas
4
2002
Improved distinguishers for HC-128. Zbl 1236.94067
Stankovski, Paul; Ruj, Sushmita; Hell, Martin; Johansson, Thomas
4
2012
Coded-BKW with sieving. Zbl 1420.94068
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski, Paul
4
2017
On the asymptotics of solving the LWE problem using coded-BKW with sieving. Zbl 1432.94134
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski Wagner, Paul
4
2019
On the construction of perfect authentication codes that permit arbitration. Zbl 0870.94030
Johansson, Thomas
4
1994
A survey on fast correlation attacks. Zbl 1285.94037
Ågren, Martin; Löndahl, Carl; Hell, Martin; Johansson, Thomas
4
2012
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time. Zbl 1258.94037
Hell, Martin; Johansson, Thomas
4
2011
Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Zbl 1029.00054
3
2003
Theoretical analysis of a correlation attack based on convolutional codes. Zbl 1062.94037
Johansson, Thomas; Jönsson, Fredrik
3
2002
Authentication codes for nontrusting parties obtained from rank metric codes. Zbl 0839.94009
Johansson, Thomas
3
1995
An efficient state recovery attack on X-FCSR-256. Zbl 1248.94096
Stankovski, Paul; Hell, Martin; Johansson, Thomas
3
2009
Linear cryptanalysis of printcipher – trails and samples everywhere. Zbl 1291.94036
Ågren, Martin; Johansson, Thomas
3
2011
Two new attacks on the self-shrinking generator. Zbl 1309.94147
Hell, Martin; Johansson, Thomas
3
2006
Cryptanalysis of Achterbahn. Zbl 1234.68091
Johansson, Thomas; Meier, Willi; Muller, Frédéric
3
2006
A new decryption failure attack against HQC. Zbl 1511.94108
Guo, Qian; Johansson, Thomas
3
2020
Making the BKW algorithm practical for LWE. Zbl 1492.94071
Budroni, Alessandro; Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Wagner, Paul Stankovski
3
2020
Faster dual lattice attacks for solving LWE with applications to CRYSTALS. Zbl 1514.94093
Guo, Qian; Johansson, Thomas
3
2021
A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences. Zbl 1351.94070
Wang, Hui; Stankovski, Paul; Johansson, Thomas
2
2015
Construction of cryptographically important Boolean functions. Zbl 1033.94534
Maity, Soumen; Johansson, Thomas
2
2002
Some attacks on the bit-search generator. Zbl 1140.68389
Hell, Martin; Johansson, Thomas
2
2005
A key recovery reaction attack on QC-MDPC. Zbl 1432.81024
Guo, Qian; Johansson, Thomas; Stankovski Wagner, Paul
2
2019
Two general attacks on Pomaranch-like keystream generators. Zbl 1186.94437
Englund, Håkan; Hell, Martin; Johansson, Thomas
2
2007
Revisiting the concrete security of Goldreich’s pseudorandom generator. Zbl 1489.94114
Yang, Jing; Guo, Qian; Johansson, Thomas; Lentmaier, Michael
2
2022
Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Zbl 1029.00080
1
2003
Correlation attacks using a new class of weak feedback polynomials. Zbl 1079.68542
Englund, Håkan; Hell, Martin; Johansson, Thomas
1
2004
An efficient state recovery attack on the X-FCSR family of stream ciphers. Zbl 1350.94051
Stankovski, Paul; Hell, Martin; Johansson, Thomas
1
2014
Some cryptanalytic and coding-theoretic applications of a soft Stern algorithm. Zbl 1419.94037
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Wagner, Paul Stankovski
1
2019
A new birthday-type algorithm for attacking the fresh re-keying countermeasure. Zbl 1481.94105
Guo, Qian; Johansson, Thomas
1
2019
On the problem of finding linear approximations and cryptanalysis of Pomaranch version 2. Zbl 1161.94406
Hell, Martin; Johansson, Thomas
1
2007
On equivalence classes of Boolean functions. Zbl 1339.94103
Wang, Qichun; Johansson, Thomas
1
2011
Improved distinguishers on stream ciphers with certain weak feedback polynomials. Zbl 1364.94503
Hell, Martin; Johansson, Thomas; Brynielsson, Lennart; Englund, Håkan
1
2012
Revisiting the concrete security of Goldreich’s pseudorandom generator. Zbl 1489.94114
Yang, Jing; Guo, Qian; Johansson, Thomas; Lentmaier, Michael
2
2022
Faster dual lattice attacks for solving LWE with applications to CRYSTALS. Zbl 1514.94093
Guo, Qian; Johansson, Thomas
3
2021
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM. Zbl 1504.94144
Guo, Qian; Johansson, Thomas; Nilsson, Alexander
9
2020
Solving LPN using covering codes. Zbl 1455.94161
Guo, Qian; Johansson, Thomas; Löndahl, Carl
8
2020
A new decryption failure attack against HQC. Zbl 1511.94108
Guo, Qian; Johansson, Thomas
3
2020
Making the BKW algorithm practical for LWE. Zbl 1492.94071
Budroni, Alessandro; Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Wagner, Paul Stankovski
3
2020
Decryption failure attacks on IND-CCA secure lattice-based schemes. Zbl 1509.94082
D’Anvers, Jan-Pieter; Guo, Qian; Johansson, Thomas; Nilsson, Alexander; Vercauteren, Frederik; Verbauwhede, Ingrid
12
2019
A novel CCA attack using decryption errors against LAC. Zbl 1456.94080
Guo, Qian; Johansson, Thomas; Yang, Jing
11
2019
An AEAD variant of the Grain stream cipher. Zbl 1432.94136
Hell, Martin; Johansson, Thomas; Meier, Willi; Sönnerup, Jonathan; Yoshida, Hirotaka
7
2019
On the asymptotics of solving the LWE problem using coded-BKW with sieving. Zbl 1432.94134
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski Wagner, Paul
4
2019
A key recovery reaction attack on QC-MDPC. Zbl 1432.81024
Guo, Qian; Johansson, Thomas; Stankovski Wagner, Paul
2
2019
Some cryptanalytic and coding-theoretic applications of a soft Stern algorithm. Zbl 1419.94037
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Wagner, Paul Stankovski
1
2019
A new birthday-type algorithm for attacking the fresh re-keying countermeasure. Zbl 1481.94105
Guo, Qian; Johansson, Thomas
1
2019
A reaction attack on the QC-LDPC McEliece cryptosystem. Zbl 1437.94061
Fabšič, Tomáš; Hromada, Viliam; Stankovski, Paul; Zajac, Pavol; Guo, Qian; Johansson, Thomas
8
2017
Coded-BKW with sieving. Zbl 1420.94068
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski, Paul
4
2017
A key recovery attack on MDPC with CCA security using decoding errors. Zbl 1404.94079
Guo, Qian; Johansson, Thomas; Stankovski, Paul
20
2016
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension. Zbl 1402.94064
Löndahl, Carl; Johansson, Thomas; Koochak Shooshtari, Masoumeh; Ahmadian-Attari, Mahmoud; Aref, Mohammad Reza
5
2016
Coded-BKW: solving LWE using lattice codes. Zbl 1336.94051
Guo, Qian; Johansson, Thomas; Stankovski, Paul
14
2015
A new algorithm for solving ring-LPN with a reducible polynomial. Zbl 1359.94602
Guo, Qian; Johansson, Thomas; Löndahl, Carl
5
2015
A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences. Zbl 1351.94070
Wang, Hui; Stankovski, Paul; Johansson, Thomas
2
2015
Solving LPN using covering codes. Zbl 1306.94059
Guo, Qian; Johansson, Thomas; Löndahl, Carl
12
2014
Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications. Zbl 1335.11098
Löndahl, Carl; Johansson, Thomas
5
2014
An efficient state recovery attack on the X-FCSR family of stream ciphers. Zbl 1350.94051
Stankovski, Paul; Hell, Martin; Johansson, Thomas
1
2014
Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Zbl 1263.94005
6
2013
Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Zbl 1239.94002
11
2012
Improved distinguishers for HC-128. Zbl 1236.94067
Stankovski, Paul; Ruj, Sushmita; Hell, Martin; Johansson, Thomas
4
2012
A survey on fast correlation attacks. Zbl 1285.94037
Ågren, Martin; Löndahl, Carl; Hell, Martin; Johansson, Thomas
4
2012
Improved distinguishers on stream ciphers with certain weak feedback polynomials. Zbl 1364.94503
Hell, Martin; Johansson, Thomas; Brynielsson, Lennart; Englund, Håkan
1
2012
A note on fast algebraic attacks and higher order nonlinearities. Zbl 1295.94150
Wang, Qichun; Johansson, Thomas
11
2011
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time. Zbl 1258.94037
Hell, Martin; Johansson, Thomas
4
2011
Linear cryptanalysis of printcipher – trails and samples everywhere. Zbl 1291.94036
Ågren, Martin; Johansson, Thomas
3
2011
On equivalence classes of Boolean functions. Zbl 1339.94103
Wang, Qichun; Johansson, Thomas
1
2011
An overview of distinguishing attacks on stream ciphers. Zbl 1178.94189
Hell, Martin; Johansson, Thomas; Brynielsson, Lennart
11
2009
An efficient state recovery attack on X-FCSR-256. Zbl 1248.94096
Stankovski, Paul; Hell, Martin; Johansson, Thomas
3
2009
Breaking the F-FCSR-H stream cipher in real time. Zbl 1206.94071
Hell, Martin; Johansson, Thomas
5
2008
A framework for chosen IV statistical analysis of stream ciphers. Zbl 1153.94373
Englund, Håkan; Johansson, Thomas; Sönmez Turan, Meltem
17
2007
Cryptanalysis of Achterbahn-version 2. Zbl 1161.94405
Hell, Martin; Johansson, Thomas
5
2007
Two general attacks on Pomaranch-like keystream generators. Zbl 1186.94437
Englund, Håkan; Hell, Martin; Johansson, Thomas
2
2007
On the problem of finding linear approximations and cryptanalysis of Pomaranch version 2. Zbl 1161.94406
Hell, Martin; Johansson, Thomas
1
2007
Two new attacks on the self-shrinking generator. Zbl 1309.94147
Hell, Martin; Johansson, Thomas
3
2006
Cryptanalysis of Achterbahn. Zbl 1234.68091
Johansson, Thomas; Meier, Willi; Muller, Frédéric
3
2006
Fast computation of large distributions and its cryptographic applications. Zbl 1154.94419
Maximov, Alexander; Johansson, Thomas
12
2005
An improved correlation attack on A5/1. Zbl 1117.94327
Maximov, Alexander; Johansson, Thomas; Babbage, Steve
7
2005
A new simple technique to attack filter generators and related ciphers. Zbl 1117.94317
Englund, Håkan; Johansson, Thomas
5
2005
Some attacks on the bit-search generator. Zbl 1140.68389
Hell, Martin; Johansson, Thomas
2
2005
Correlation attacks using a new class of weak feedback polynomials. Zbl 1079.68542
Englund, Håkan; Hell, Martin; Johansson, Thomas
1
2004
A new version of the stream cipher SNOW. Zbl 1027.68596
Ekdahl, Patrik; Johansson, Thomas
33
2003
A construction of resilient functions with high nonlinearity. Zbl 1063.94075
Johansson, Thomas; Pasalic, Enes
14
2003
Predicting the shrinking generator with fixed connections. Zbl 1038.94529
Ekdahl, Patrik; Meier, Willi; Johansson, Thomas
6
2003
Another attack on A5/1. Zbl 1063.94072
Ekdahl, Patrik; Johansson, Thomas
5
2003
Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Zbl 1029.00054
3
2003
Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Zbl 1029.00080
1
2003
New technique for decoding codes in the rank metric and its cryptography applications. Zbl 1026.94023
Ourivski, A. V.; Johansson, T.
22
2002
On the complexity of some cryptographic problems based on the general decoding problem. Zbl 1062.94038
Johansson, Thomas; Jönsson, Fredrik
8
2002
Distinguishing attacks on SOBER-t16 and t32. Zbl 1045.94518
Ekdahl, Patrik; Johansson, Thomas
4
2002
A fast correlation attack on LILI-128. Zbl 1032.68075
Jönsson, Fredrik; Johansson, Thomas
4
2002
Theoretical analysis of a correlation attack based on convolutional codes. Zbl 1062.94037
Johansson, Thomas; Jönsson, Fredrik
3
2002
Construction of cryptographically important Boolean functions. Zbl 1033.94534
Maity, Soumen; Johansson, Thomas
2
2002
A simple algorithm for fast correlation attacks on stream ciphers. Zbl 0999.94542
Chepyzhov, Vladimor V.; Johansson, Thomas; Smeets, Ben
18
2001
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity. Zbl 0987.94521
Pasalic, Enes; Maitra, Subhamoy; Johansson, Thomas; Sarkar, Palash
14
2001
Almost \(k\)-wise independent sample spaces and their cryptologic applications. Zbl 1008.94017
Kurosawa, Kaoru; Johansson, Thomas; Stinson, Douglas R.
8
2001
Fast correlation attacks through reconstruction of linear polynomials. Zbl 0995.94523
Johansson, Thomas; Jönsson, Fredrik
18
2000
Improved fast correlation attacks on stream ciphers via convolutional codes. Zbl 0931.94027
Johansson, Thomas; Jönsson, Fredrik
21
1999
Fast correlation attacks based on turbo code techniques. Zbl 0954.94008
Johansson, Thomas; Jönsson, Fredrik
12
1999
Further results on the relation between nonlinearity and resiliency for Boolean functions. Zbl 0981.94071
Pasalic, Enes; Johansson, Thomas
9
1999
Further results on asymmetric authentication schemes. Zbl 1012.94012
Johansson, Thomas
4
1999
Reduced complexity correlation attacks on two clock-controlled generators. Zbl 0931.94026
Johansson, Thomas
7
1998
On the cardinality of systematic authentication codes via error-correcting codes. Zbl 0855.94016
Kabatianskij, Gregory A.; Smeets, Ben; Johansson, Thomas
11
1996
Universal hash functions from exponential sums over finite fields and Galois rings. Zbl 1329.94062
Helleseth, Tor; Johansson, Thomas
10
1996
Authentication codes for nontrusting parties obtained from rank metric codes. Zbl 0839.94009
Johansson, Thomas
3
1995
On families of hash functions via geometric codes and concatenation. Zbl 0870.94020
Bierbrauer, Jürgen; Johansson, Thomas; Kabatianskij, Gregory; Smeets, Ben
22
1994
Lower bounds on the probability of deception in authentication with arbitration. Zbl 0814.94012
Johansson, Thomas
14
1994
On the relation between A-codes and codes correcting independent errors. Zbl 0951.94530
Johansson, Thomas; Kabatianskii, Gregory; Smeets, Ben
10
1994
A shift register construction of unconditionally secure authentication codes. Zbl 0790.94011
Johansson, Thomas
7
1994
On the construction of perfect authentication codes that permit arbitration. Zbl 0870.94030
Johansson, Thomas
4
1994
all top 5

Cited by 621 Authors

21 Johansson, Thomas
12 Meier, Willi
10 Pasalic, Enes
10 Sarkar, Palash
9 Guo, Qian
8 Maitra, Subhamoy
8 Vaudenay, Serge
7 Zhang, Bin
6 Couteau, Geoffroy
6 Feng, Dengguo
6 Hell, Martin
5 Ding, Cunsheng
5 Hao, Yonglin
5 Li, Chao
5 May, Alexander
5 Shamir, Adi
5 Standaert, Francois-Xavier
4 Bogos, Sonia
4 Carlet, Claude
4 D’Anvers, Jan-Pieter
4 Dinur, Itai
4 Ishai, Yuval
4 Keller, Nathan
4 Löndahl, Carl
4 Paul, Goutam
4 Phan, Raphael Chung-Wei
4 Qi, Wenfeng
4 Qu, Longjiang
4 Safavi-Naini, Reihaneh
4 Santini, Paolo Maria
4 Stankovski, Paul
4 Stinson, Douglas Robert
4 Tan, Chik How
4 Todo, Yosuke
4 Wang, Qingju
4 Wei, Yongzhuang
3 Albrecht, Martin R.
3 Baldi, Marco
3 Boyle, Elette
3 Chattopadhyay, Anupam
3 Ducas, Léo
3 Dunkelman, Orr
3 Fu, Shaojing
3 Fúster-Sabater, Amparo
3 Gilboa, Niv
3 Gong, Xinxin
3 Hoffmann, Clément
3 Khalid, Ayesha
3 Khazaei, Shahram
3 Kirshanova, Elena
3 Kohl, Lisa
3 Kurosawa, Kaoru
3 Lin, Dongdai
3 Lu, Yi
3 Luykx, Atul
3 Mårtensson, Erik
3 Méaux, Pierrick
3 Mesnager, Sihem
3 Naya-Plasencia, María
3 Nyberg, Kaisa
3 Özbudak, Ferruh
3 Pei, Dingyi
3 Preneel, Bart
3 Rotella, Yann
3 Scholl, Peter
3 Sendrier, Nicolas
3 Tang, Deng
3 Tian, Tian
3 Wang, Huaxiong
3 Wang, Qichun
3 Xu, Chao
3 Zhang, Fengrong
3 Zhou, Yu
2 Abidin, Aysajan
2 Alekseychuk, Anton Nikolaevich
2 Apon, Daniel
2 Aumasson, Jean-Philippe
2 Berbain, Côme
2 Bibak, Khodakhast
2 Caballero-Gil, Pino
2 Canteaut, Anne
2 Chen, Shangdi
2 Chiaraluce, Franco
2 Cid, Carlos Frederico
2 Climent, Joan-Josep
2 Czumaj, Artur
2 Dachman-Soled, Dana
2 Demirci, Hüseyin
2 Dubrova, Elena
2 Ducros, Clément
2 El Aimani, Laila
2 Feng, Xiutao
2 Fischer, Simon
2 Gaba, Navneet
2 Gilbert, Henri
2 Gong, Huijing
2 Gouget, Aline
2 Harmanci, A. Emre
2 Helleseth, Tor
2 Hermelin, Miia
...and 521 more Authors
all top 5

Cited in 61 Serials

39 Designs, Codes and Cryptography
26 Cryptography and Communications
17 Journal of Cryptology
8 Discrete Applied Mathematics
7 Information Processing Letters
6 Quantum Information Processing
6 Advances in Mathematics of Communications
5 Information Sciences
5 Journal of Mathematical Cryptology
4 Theoretical Computer Science
4 Finite Fields and their Applications
4 Journal of Discrete Mathematical Sciences & Cryptography
4 Prikladnaya Diskretnaya Matematika
3 Information and Computation
3 International Journal of Computer Mathematics
3 Matematicheskie Voprosy Kriptografii
2 Discrete Mathematics
2 SIAM Journal on Computing
2 Acta Applicandae Mathematicae
2 Cybernetics and Systems Analysis
2 Nonlinear Dynamics
2 Journal of Systems Science and Complexity
2 Mathematics in Computer Science
2 Frontiers of Computer Science in China
1 Computers & Mathematics with Applications
1 International Journal of Theoretical Physics
1 Physics Letters. A
1 Problems of Information Transmission
1 Applied Mathematics and Computation
1 Journal of Pure and Applied Algebra
1 Journal of Statistical Planning and Inference
1 Cryptologia
1 European Journal of Combinatorics
1 Chinese Annals of Mathematics. Series B
1 Acta Mathematica Hungarica
1 Acta Mathematicae Applicatae Sinica. English Series
1 Journal of Symbolic Computation
1 Journal of Complexity
1 Random Structures & Algorithms
1 International Journal of Foundations of Computer Science
1 Distributed Computing
1 Applicable Algebra in Engineering, Communication and Computing
1 SIAM Journal on Optimization
1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
1 Applied Mathematics. Series B (English Edition)
1 Journal of Combinatorial Designs
1 Journal of Combinatorial Optimization
1 Wuhan University Journal of Natural Sciences (WUJNS)
1 Communications in Nonlinear Science and Numerical Simulation
1 International Journal of Applied Mathematics and Computer Science
1 Journal of Applied Mathematics and Computing
1 Science in China. Series F
1 Annales Universitatis Mariae Curie-Skłodowska. Sectio A1. Informatica
1 Foundations and Trends in Communications and Information Theory
1 Science China. Information Sciences
1 Symmetry
1 Diskretnyĭ Analiz i Issledovanie Operatsiĭ
1 S\(\vec{\text{e}}\)MA Journal
1 International Journal of Engineering Mathematics
1 Open Mathematics
1 SIAM Journal on Applied Algebra and Geometry

Citations by Year