Cryptographers' World
 

Thomas Johansson


Author's Web Page Link

33 papers in database with 1111 citations StarStar

Editor of 2 conference proceedings books

H-number: 18

Conference Proceedings

 
1. Thomas JohanssonSubhamoy Maitra, editors, Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings. Springer, 2003. ISBN 3-540-20609-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Thomas Johansson, editor, Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers. Springer, 2003. ISBN 3-540-20449-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Kaoru Kurosawa,  Thomas Johansson,  Douglas R. Stinson,  Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications, Journal of Cryptology, Volume 14(4), pp. 231 - 253, Springer, 2001.

[Cited 27 times ]

2. Thomas Johansson,  Authentication Codes for Nontrusting Parties Obtained from Rank Metric Codes, Designs, Codes and Cryptography, Volume 6(3), pp. 205 - 218, Springer, 1995.

[Electronic Edition][Cited 13 times ]

3. Thomas Johansson,  A Shift Register Construction of Unconditionally Secure Authentication Codes, Designs, Codes and Cryptography, Volume 4(1), pp. 69 - 81, Springer, 1994.

[Electronic Edition][Cited 10 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Paul Stankovski,  Martin Hell,  Thomas Johansson,  An Efficient State Recovery Attack on X-FCSR-256, pp. 23 - 37, FSE 2009.

[Electronic Edition][Cited 4 times ]

2. Martin Hell,  Thomas Johansson,  Breaking the F-FCSR-H Stream Cipher in Real Time, pp. 557 - 569, ASIACRYPT 2008.

[Electronic Edition][Cited 20 times ]

3. H√•kan Englund,  Thomas Johansson,  Meltem S√∂nmez Turan,  A Framework for Chosen IV Statistical Analysis of Stream Ciphers, pp. 268 - 281, INDOCRYPT 2007.

[Electronic Edition][Cited 24 times ]

4. H√•kan Englund,  Martin Hell,  Thomas Johansson,  Two General Attacks on Pomaranch-Like Keystream Generators, pp. 274 - 289, FSE 2007.

[Electronic Edition][Cited 3 times ]

5. Martin Hell,  Thomas Johansson,  A Key Recovery Attack on Edon80, pp. 568 - 581, ASIACRYPT 2007.

[Electronic Edition][Cited 2 times ]

6. Thomas Johansson,  Willi Meier,  Fr√©d√©ric Muller,  Cryptanalysis of Achterbahn, pp. 1 - 14, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

7. Martin Hell,  Thomas Johansson,  Cryptanalysis of Achterbahn-Version 2, pp. 45 - 55, SAC 2006.

[Electronic Edition][Cited 6 times ]

8. Martin Hell,  Thomas Johansson,  On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2, pp. 220 - 233, SAC 2006.

[Electronic Edition][Cited 5 times ]

9. Alexander Maximov,  Thomas Johansson,  Fast Computation of Large Distributions and Its Cryptographic Applications, pp. 313 - 332, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

10. H√•kan Englund,  Thomas Johansson,  A New Distinguisher for Clock Controlled Stream Ciphers, pp. 181 - 195, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

11. Martin Hell,  Thomas Johansson,  Some Attacks on the Bit-Search Generator, pp. 215 - 227, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

12. H√•kan Englund,  Thomas Johansson,  A New Simple Technique to Attack Filter Generators and Related Ciphers, pp. 39 - 53, SAC 2004.

[Electronic Edition][Cited 23 times ]

13. Alexander Maximov,  Thomas Johansson,  Steve Babbage,  An Improved Correlation Attack on A5/1, pp. 1 - 18, SAC 2004.

[Electronic Edition][Cited 22 times ]

14. H√•kan Englund,  Martin Hell,  Thomas Johansson,  Correlation Attacks Using a New Class of Weak Feedback Polynomials, pp. 127 - 142, FSE 2004.

[Electronic Edition][Cited 7 times ]

15. Patrik Ekdahl,  Willi Meier,  Thomas Johansson,  Predicting the Shrinking Generator with Fixed Connections, pp. 330 - 344, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 31 times ]

16. Soumen Maity,  Thomas Johansson,  Construction of Cryptographically Important Boolean Functions, pp. 234 - 245, INDOCRYPT 2002.

[Electronic Edition][Cited 22 times ]

17. Patrik Ekdahl,  Thomas Johansson,  A New Version of the Stream Cipher SNOW, pp. 47 - 61, SAC 2002.

[Electronic Edition][Cited 122 times Red StarRed Star]

18. Patrik Ekdahl,  Thomas Johansson,  Distinguishing Attacks on SOBER-t16 and t32, pp. 210 - 224, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 40 times ]

19. Thomas Johansson,  Fredrik J√∂nsson,  Fast Correlation Attacks through Reconstruction of Linear Polynomials, pp. 300 - 315, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 105 times Red StarRed Star]

20. Vladimor V. Chepyzhov,  Thomas Johansson,  Ben J. M. Smeets,  A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers, pp. 181 - 195, FSE 2000.

[Electronic Edition][Cited 115 times Red StarRed Star]

21. Thomas Johansson,  Fredrik J√∂nsson,  Fast Correlation Attacks Based on Turbo Code Techniques, pp. 181 - 197, CRYPTO 1999.

[Electronic Edition][Cited 90 times Red Star]

22. Thomas Johansson,  Fredrik J√∂nsson,  Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes, pp. 347 - 362, EUROCRYPT 1999.

[Electronic Edition][Cited 116 times Red StarRed Star]

23. Thomas Johansson,  Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators, pp. 342 - 356, ASIACRYPT 1998.

[Electronic Edition][Cited 59 times Red Star]

24. Kaoru Kurosawa,  Thomas Johansson,  Douglas R. Stinson,  Almost k-wise Independent Sample Spaces and Their Cryptologic Applications, pp. 409 - 421, EUROCRYPT 1997.

[Electronic Edition][Cited 32 times ]

25. Thomas Johansson,  Bucket Hashing with a Small Key Size, pp. 149 - 162, EUROCRYPT 1997.

[Electronic Edition][Cited 18 times ]

26. Tor Helleseth,  Thomas Johansson,  Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings, pp. 31 - 44, CRYPTO 1996.

[Electronic Edition][Cited 38 times ]

27. Thomas Johansson,  Ben J. M. Smeets,  On A-Codes Including Arbiter's Attacks, pp. 456 - 460, EUROCRYPT 1994.

[Electronic Edition][Cited 2 times ]

28. J√ľrgen Bierbrauer,  Thomas Johansson,  Gregory Kabatianskii,  Ben J. M. Smeets,  On Families of Hash Functions via Geometric Codes and Concatenation, pp. 331 - 342, CRYPTO 1993.

[Electronic Edition][Cited 69 times Red Star]

29. Thomas Johansson,  On the Construction of Perfect Authentication Codes that Permit Arbitration, pp. 343 - 354, CRYPTO 1993.

[Electronic Edition][Cited 10 times ]

30. Thomas Johansson,  Gregory Kabatianskii,  Ben J. M. Smeets,  On the Relation between A-Codes and Codes Correcting Independent Errors, pp. 1 - 11, EUROCRYPT 1993.

[Electronic Edition][Cited 49 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...