Thomas Johansson
151 – 160 of 178
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 1998
-
Mark
Reduced complexity correlation attacks on two clock-controlled generators
(1998) International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT’98 1514. p.342-356
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On key and message equivocations in secrecy systems
- Contribution to journal › Article
-
Mark
A simple one sweep algorithm for optimal APP symbol decoding of linear block codes
- Contribution to journal › Article
-
Mark
A simple one sweep algorithm for optimal APP symbol decoding of linear block codes
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Correlation attacks on stream ciphers and related decoding problems
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On some cryptographic problems based on the general decoding problem
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1997
-
Mark
Bucket hashing with a small key size'
(1997) nternational Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ’97 1233. p.149-162
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Almost k-wise independent sample spaces and their cryptologic applications
(1997) International Conference on the Theory and Application of Cryptographic Techniques - EUROCRYPT'97 1233. p.409-421
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Codes combining error detection and authentication
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Coding problems of cryptography or codesets vs. codewords
- Contribution to conference › Paper, not in proceeding
