Thomas Johansson
Orcid: 0000-0003-1798-570XAffiliations:
- Lund University, Sweden
According to our database1,
Thomas Johansson
authored at least 132 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Theory, November, 2024
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2023
J. Cryptogr. Eng., November, 2023
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
2022
IEEE Trans. Inf. Theory, 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM.
IACR Cryptol. ePrint Arch., 2020
Sci. China Inf. Sci., 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IEEE Trans. Inf. Theory, 2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Inf. Process. Lett., 2019
IACR Cryptol. ePrint Arch., 2019
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke.
IACR Cryptol. ePrint Arch., 2019
Adv. Math. Commun., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem.
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the Codes, Cryptology and Information Security, 2019
2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes.
IET Inf. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension.
Des. Codes Cryptogr., 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
IEEE Trans. Inf. Theory, 2015
A generalized birthday approach for efficiently finding linear relations in ℓ-sequences.
Des. Codes Cryptogr., 2015
2014
J. Cryptol., 2014
Improved algorithms for finding low-weight polynomial multiples in F<sub>2</sub>[x] and some cryptographic applications.
Des. Codes Cryptogr., 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
2012
IEEE Trans. Inf. Theory, 2012
IET Inf. Secur., 2012
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the 7th International Symposium on Turbo Codes and Iterative Information Processing, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Int. J. Wirel. Mob. Comput., 2011
IACR Cryptol. ePrint Arch., 2011
2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Int. J. Wirel. Mob. Comput., 2007
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
2006
Int. J. Secur. Networks, 2006
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the 2005 International Conference on Field Programmable Logic and Applications (FPL), 2005
Proceedings of the Advances in Cryptology, 2005
2004
IEEE Trans. Commun., 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
2003
IEEE Trans. Inf. Theory, 2003
Proceedings of the Cryptography and Coding, 2003
Proceedings of the Advances in Cryptology, 2003
2002
On the complexity of some cryptographic problems based on the general decoding problem.
IEEE Trans. Inf. Theory, 2002
IEEE Trans. Inf. Theory, 2002
New Technique for Decoding Codes in the Rank Metric and Its Cryptography Applications.
Probl. Inf. Transm., 2002
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
2001
J. Cryptol., 2001
New Constructions of Resilient and Correlation Immune Boolean Functions Achieving Upper Bound on Nonlinearity.
Electron. Notes Discret. Math., 2001
2000
New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity.
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions.
Proceedings of the Cryptography and Coding, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
IEEE Trans. Inf. Theory, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the Advances in Cryptology, 1997
1996
IEEE Trans. Inf. Theory, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Des. Codes Cryptogr., 1995
1994
IEEE Trans. Inf. Theory, 1994
Des. Codes Cryptogr., 1994
Proceedings of the PARLE '94: Parallel Architectures and Languages Europe, 1994
Proceedings of the 12th IAPR International Conference on Pattern Recognition, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993