Crypto and Security-lup-obsolete
1 – 69 of 69
- show: 100
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2015
-
Mark
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial
(
- Contribution to journal › Article
-
Mark
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A generalized birthday approach for efficiently finding linear relations in l-sequences
(
- Contribution to journal › Article
-
Mark
Coded-BKW: Solving LWE Using Lattice Codes.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Towards Bridging the Gap Between Dalvik Bytecode and Native Code During Static Analysis of Android Applications
2015) International Wireless Communications and Mobile Computing Conference 2015(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications
(
- Contribution to journal › Article
-
Mark
Using TPM Secure Storage in Trusted High Availability Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
2014)(
- Book/Report › Report
- 2013
-
Mark
Cryptanalysis of Selected Stream Ciphers
(
- Thesis › Doctoral thesis (monograph)
-
Mark
Improved Key Recovery Attack on the BEAN Stream Cipher
2013) In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96A(6). p.1437-1444(
- Contribution to journal › Article
-
Mark
A new instruction overlapping technique for improved anti-disassembly and obfuscation of x86 binaries
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Advances in Cryptology -- EUROCRYPT 2013
Johansson, Thomas LU and Phong Q., Nguyen (2013)
- Book/Report › Anthology (editor)
- 2012
-
Mark
Analysis of Malicious and Benign Android Applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved distinguishers for HC-128
(
- Contribution to journal › Article
-
Mark
A Survey on Fast Correlation Attacks
(
- Contribution to journal › Scientific review
-
Mark
Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques
- Book/Report › Anthology (editor)
-
Mark
Analysis of Xorrotation With Application to an HC-128 Variant
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
2012) The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some instant- and practical-time related-key attacks on KTANTAN32/48/64
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials
(
- Contribution to journal › Article
-
Mark
On Hardware-Oriented Message Authentication
(
- Contribution to journal › Article
-
Mark
On Some Symmetric Lightweight Cryptographic Designs
2012)(
- Thesis › Doctoral thesis (monograph)
-
Mark
Some results on fast algebraic attacks and higher-order non-linearities
(
- Contribution to journal › Article
-
Mark
Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On The Distribution of Linear Biases: Three Instructive Examples
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2011
-
Mark
Searching for new convolutional codes using the cell broadband engine architecture
(
- Contribution to journal › Article
-
Mark
Foveating instructional videos based on experts’ eye movements to teach perception and interpretation of dynamic scenes
2011) 16th European Conference on Eye Movements, ECEM, 2011 In Journal of Eye Movement Research 4(3). p.282-282(
- Contribution to journal › Published meeting abstract
-
Mark
Grain-128a: a new version of Grain-128 with optional authentication
(
- Contribution to journal › Article
-
Mark
A Technique for Remote Detection of Certain Virtual Machine Monitors
2011) The Third International Conference on Trusted Systems, INTRUST 2011 In Lecture Notes in Computer Science 7222. p.129-137(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
(
- Contribution to journal › Article
-
Mark
Participants know best : The effect of calibration method on data quality
(
- Contribution to journal › Published meeting abstract
-
Mark
Optimizing viewing procedures of breast tomosynthesis image volumes using eye tracking combined with a free response human observer study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Eye Tracking : A Comprehensive Guide to Methods and Measures
2011)(
- Book/Report › Book
-
Mark
Can horizontally oriented breast tomosynthesis image volumes or the use of a systematic search strategy improve interpretation? An eye tracking and free response human observer study
2011) Medical Imaging 2011: Image Perception, Observer Performance, and Technology Assessment 7966(796606).(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Scanpath similarity depends on how you look at it: Evaluating a ‘MultiMatch’ comparison algorithm
(
- Contribution to journal › Published meeting abstract
-
Mark
Quantification of the effects of calibration method and eye factors on eye- tracking accuracy
2011) 16th European Conference on Eye Movements, ECEM, 2011 In Journal of Eye Movement Research 4(3). p.96-96(
- Contribution to journal › Published meeting abstract
-
Mark
Event detection in data with static and dynamic stimuli
2011) 16th European Conference on Eye Movements, ECEM, 2011 In [Publication information missing] p.37-37(
- Contribution to journal › Published meeting abstract
-
Mark
Linear Attacks on Stream Ciphers
2011) p.55-85(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Cryptanalysis of the Stream cipher BEAN
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On Hardware-Oriented Message Authentication with Applications Towards RFID
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On equivalence classes of Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
An improvement to Stern's algorithm
2011)(
- Book/Report › Report
-
Mark
A note on fast algebraic attacks and higher order nonlinearities
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Evaluation of Some Algorithms for Hardware-Oriented Message Authentication
2011)(
- Book/Report › Report
-
Mark
A new method for comparing scanpaths based on vectors and dimensions
2011) Vision Sceinces Society(
- Contribution to conference › Abstract
-
Mark
Eye-tracking studie av vektoranalys på LTH
2011) Lunds universitets utvecklingskonferens, 2011(
- Contribution to conference › Abstract
-
Mark
A New Version of Grain-128 with Authentication
2011) Symmetric Key Encryption Workshop 2011(
- Contribution to conference › Paper, not in proceeding
- 2010
-
Mark
Effect of Compressed Offline Foveated Video on Viewing Behavior and Subjective Quality
(
- Contribution to journal › Article
-
Mark
Greedy distinguishers and nonrandomness detectors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Vector-based, Multidimensional Scanpath Similarity Measure
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Laboratory instructions as a cause of student dissonance
2010) LTHs 6:e Pedagogiska Inspirationskonferens, 2010(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Sampling frequency and eye-tracking measures : how speed affects durations, latencies, and more
(
- Contribution to journal › Article
-
Mark
Security Evaluation of Stream Cipher Enocoro-128v2
2010)(
- Book/Report › Report
-
Mark
Learning perceptual aspects of diagnosis in medicine via eye movement modeling examples on patient video cases
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Automated algebraic cryptanalysis
2010) Tools for Cryptanalysis 2010 In Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010 p.11-11(
- Contribution to journal › Published meeting abstract
-
Mark
What speed do I need? Sampling frequency and dependent variables
2010) Scandinavian Workshop on Applied Eye-Tracking, 2010(
- Contribution to conference › Abstract
-
Mark
Fostering Perceptual Skills in Medical Diagnosis
2010) Meeting of the EARLI SIG6/7 Instructional Design and Learning and Instruction with Computers(
- Contribution to conference › Paper, not in proceeding
-
Mark
Using Coding Techniques to Analyze Weak Feedback Polynomials
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An adaptive algorithm for fixation, saccade, and glissade detection in eyetracking data.
(
- Contribution to journal › Article
- 2009
-
Mark
An overview of distinguishing attacks on stream ciphers
(
- Contribution to journal › Article
-
Mark
Improving the rainbow attack by reusing colours
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An efficient state recovery attack on X-FCSR-256
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Another look at weak feedback polynomials in the nonlinear combiner
(
- Contribution to conference › Paper, not in proceeding
- 2008
-
Mark
Off-line Foveated Compression and Scene Perception: An Eye-Tracking Approach
2008)(
- Thesis › Doctoral thesis (monograph)
-
Mark
The Grain family of stream ciphers
2008) p.179-190(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Semantic override of low-level features in image viewing - both initially and overall
(
- Contribution to journal › Article
-
Mark
One-sweep APP decoding algorithm for binary block codes with reduced trellis memory
2008) p.88-93(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Breaking the F-FCSR-H stream cipher in real time
2008) ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security 5350. p.557-569(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding