Martin Hell

Orcid: 0000-0002-5694-5447

According to our database1, Martin Hell authored at least 63 papers between 2004 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Security Issue Classification for Vulnerability Management with Semi-supervised Learning.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction.
IACR Cryptol. ePrint Arch., 2021

Flowrider: Fast On-Demand Key Provisioning for Cloud Networks.
Proceedings of the Security and Privacy in Communication Networks, 2021

Using Program Analysis to Identify the Use of Vulnerable Functions.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study.
Proceedings of the Product-Focused Software Process Improvement, 2021

On-demand Key Distribution for Cloud Networks.
Proceedings of the 24th Conference on Innovation in Clouds, 2021

2020
Software Evaluation of Grain-128AEAD for Embedded Platforms.
IACR Cryptol. ePrint Arch., 2020

On the Suitability of Using SGX for Secure Key Storage in the Cloud.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Energy consumption for securing lightweight IoT protocols.
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020

Evaluation of the HAVOSS software process maturity model.
Proceedings of the 46th Euromicro Conference on Software Engineering and Advanced Applications, 2020

Automated CPE Labeling of CVE Summaries with Machine Learning.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
Efficient Hardware Implementations of Grain-128AEAD.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Sharing of Vulnerability Information Among Companies - A Survey of Swedish Companies.
Proceedings of the 45th Euromicro Conference on Software Engineering and Advanced Applications, 2019

A Recommender System for User-Specific Vulnerability Scoring.
Proceedings of the Risks and Security of Internet and Systems, 2019

An AEAD Variant of the Grain Stream Cipher.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Guarding the Guards: Accountable Authorities in VANETs.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components.
Proceedings of the Product-Focused Software Process Improvement, 2018

Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code.
Proceedings of the 22nd IEEE International Enterprise Distributed Object Computing Workshop, 2018

2017
Espresso: A stream cipher for 5G wireless communication systems.
Cryptogr. Commun., 2017

Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors.
Proceedings of the Information Systems Security and Privacy, 2017

Improved Greedy Nonrandomness Detectors for Stream Ciphers.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Blockchain-Based Publishing Layer for the Keyless Signing Infrastructure.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Enabling Key Migration Between Non-compatible TPM Versions.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016

Exploiting Trust in Deterministic Builds.
Proceedings of the Computer Safety, Reliability, and Security, 2016

2015
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers.
J. Cryptol., 2014

eavesROP: Listening for ROP Payloads in Data Streams.
Proceedings of the Information Security - 17th International Conference, 2014

The efficiency of optimal sampling in the random S-box model.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Using TPM Secure Storage in Trusted High Availability Systems.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Improved Key Recovery Attack on the BEAN Stream Cipher.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2012
Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials.
IEEE Trans. Inf. Theory, 2012

On hardware-oriented message authentication.
IET Inf. Secur., 2012

Improved distinguishers for HC-128.
Des. Codes Cryptogr., 2012

A survey on fast correlation attacks.
Cryptogr. Commun., 2012

Improved message passing techniques in fast correlation attacks on stream ciphers.
Proceedings of the 7th International Symposium on Turbo Codes and Iterative Information Processing, 2012

An optimal sampling technique for distinguishing random S-boxes.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Analysis of Xorrotation with Application to an HC-128 Variant.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time.
J. Cryptol., 2011

Grain-128a: a new version of Grain-128 with optional authentication.
Int. J. Wirel. Mob. Comput., 2011

Searching for New Convolutional Codes using the Cell Broadband Engine Architecture.
IEEE Commun. Lett., 2011

Cryptanalysis of the stream cipher BEAN.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

A Technique for Remote Detection of Certain Virtual Machine Monitors.
Proceedings of the Trusted Systems - Third International Conference, 2011

2010
Using coding techniques to analyze weak feedback polynomials.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
An overview of distinguishing attacks on stream ciphers.
Cryptogr. Commun., 2009

Another look at weak feedback polynomials in the nonlinear combiner.
Proceedings of the IEEE International Symposium on Information Theory, 2009

An Efficient State Recovery Attack on X-FCSR-256.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Improving the Rainbow Attack by Reusing Colours.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
The Grain Family of Stream Ciphers.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

Breaking the F-FCSR-H Stream Cipher in Real Time.
Proceedings of the Advances in Cryptology, 2008

2007
On the Design and Analysis of Stream Ciphers.
PhD thesis, 2007

Grain: a stream cipher for constrained environments.
Int. J. Wirel. Mob. Comput., 2007

Cryptanalysis of Achterbahn-128/80.
IET Inf. Secur., 2007

A Note on Distinguishing Attacks.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

Two General Attacks on Pomaranch-Like Keystream Generators.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

A Key Recovery Attack on Edon80.
Proceedings of the Advances in Cryptology, 2007

2006
Two New Attacks on the Self-Shrinking Generator.
IEEE Trans. Inf. Theory, 2006

On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Cryptanalysis of Achterbahn-Version 2.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

A Stream Cipher Proposal: Grain-128.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Some Attacks on the Bit-Search Generator.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Towards a General RC4-Like Keystream Generator.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables.
IACR Cryptol. ePrint Arch., 2004

Correlation Attacks Using a New Class of Weak Feedback Polynomials.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004


  Loading...