Thomas Johansson
Lunds Universitet
H-index: 50
Europe-Sweden
Top articles of Thomas Johansson
Correlation Attacks on Stream Ciphers
Symmetric Cryptography 2: Cryptanalysis and Future Directions
2024/1/5
Thomas Johansson
H-Index: 22
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
33rd USENIX Security Symposium (USENIX Security 24). Philadelphia, PA: USENIX Association
2024
Qian Guo
H-Index: 10
Thomas Johansson
H-Index: 22
Cache-timing attack against HQC
Cryptology ePrint Archive
2023
A new sieving-style information-set decoding algorithm
Cryptology ePrint Archive
2023
Sca-ldpc: A code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes
2023/12/4
A side-channel attack on a masked and shuffled software implementation of Saber
Journal of Cryptographic Engineering
2023/11
Post-Quantum Cryptography: 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings
2023/8/9
Thomas Johansson
H-Index: 22
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
2023/6/25
Thomas Johansson
H-Index: 22
Vu Nguyen
H-Index: 8
Post-Quantum Cryptography
2022
Post-Quantum Cryptography: 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings
2022/9/25
Jung Hee Cheon
H-Index: 29
Thomas Johansson
H-Index: 22
A key-recovery side-channel attack on Classic McEliece implementations
IACR Transactions on Cryptographic Hardware and Embedded Systems
2022/8/31
Don’t reject this: Key-recovery timing attacks due to rejection-sampling in HQC and BIKE
IACR Transactions on Cryptographic Hardware and Embedded Systems
2022/6/8
Attacks on the Firekite cipher
IACR Transactions on Symmetric Cryptology
2022
Thomas Johansson
H-Index: 22
Vu Nguyen
H-Index: 8
Grain-128AEADv2: strengthening the initialization against key reconstruction
2021/12/9
Martin Hell
H-Index: 12
Thomas Johansson
H-Index: 22
Breaking masked and shuffled CCA secure Saber KEM by power analysis
2021/11/19
Revisiting the concrete security of goldreich’s pseudorandom generator
IEEE Transactions on Information Theory
2021/11/15
Improvements on making BKW practical for solving LWE
Cryptography
2021/12
Alessandro Budroni
H-Index: 2
Qian Guo
H-Index: 10
Thomas Johansson
H-Index: 22
Paul Stankovski Wagner
H-Index: 7
A side-channel attack on a masked IND-CCA secure saber KEM implementation
IACR Transactions on Cryptographic Hardware and Embedded Systems
2021/8/11
A weighted bit flipping decoder for QC-MDPC-based cryptosystems
2021/7/12
Alexander Nilsson
H-Index: 5
Thomas Johansson
H-Index: 22
SNOW-Vi
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
2021/6/28
Thomas Johansson
H-Index: 22
Jing Yang
H-Index: 14