1 – 78 of 78
- show: 250
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
2022) p.84-95(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2021
-
Mark
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
2021) EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEAD, Round 3 Tweak and Motivation
2021)(
- Book/Report › Report
-
Mark
On-demand Key Distribution for Cloud Networks
2021) 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using Program Analysis to Identify the Use of Vulnerable Functions
2021) p.520-530(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2020
-
Mark
Software Defined Networking for Emergency Traffic Management in Smart Cities
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Recommender System for User-Specific Vulnerability Scoring
2020) 14th International Conference on Risk and Security of Internet and Systems, CRISIS 2019 In Lecture Notes in Computer Science 12026. p.355-364(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the Suitability of Using SGX for Secure Key Storage in the Cloud
2020) 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus2020 12395. p.32-47(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Software Evaluation of Grain-128AEAD for Embedded Platforms
2020)(
- Book/Report › Report
-
Mark
Evaluation of the HAVOSS software process maturity model
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Automated CPE Labeling of CVE Summaries with Machine Learning
2020) 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12223 LNCS. p.3-22(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Electromagnetic Side-Channel Attack on AES using Low-end Equipment
(
- Contribution to journal › Article
-
Mark
Energy Consumption for Securing Lightweight IoT Protocols
2020)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
Guarding the Guards: Accountable Authorities in VANETs
2019) 2018 IEEE Vehicular Networking Conference (VNC)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An AEAD Variant of the Grain Stream Cipher
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
2019)(
- Other contribution › Miscellaneous
-
Mark
Sharing of vulnerability information among companies - a survey of Swedish companies
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Efficient Hardware Implementations of Grain-128AEAD
2019) 20th International Conference on Cryptology in India, INDOCRYPT 2019 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11898 LNCS. p.495-513(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2018
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluating Security of Software Through Vulnerability Metrics
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Not so greedy : Enhanced subset exploration for nonrandomness detectors
2018) International Conference on Information Systems Security and Privacy In Communications in Computer and Information Science 867. p.273-294(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components
2018) International Conference on on Product-Focused Software Process Improvement (PROFES 2018) In Lecture Notes in Computer Science 11271. p.81-97(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Improved Greedy Nonrandomness Detectors for Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Blockchain-based publishing layer for the Keyless Signing Infrastructure
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Espresso: A stream cipher for 5G wireless communication systems
(
- Contribution to journal › Article
- 2016
-
Mark
Enabling Key Migration Between Non-Compatible TPM Versions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Exploiting Trust in Deterministic Builds
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2015
-
Mark
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
Using TPM Secure Storage in Trusted High Availability Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Efficiency of Optimal Sampling in the Random S-box Model
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
2014)(
- Book/Report › Report
-
Mark
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
(
- Contribution to journal › Article
- 2013
-
Mark
Improved Key Recovery Attack on the BEAN Stream Cipher
2013) In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96A(6). p.1437-1444(
- Contribution to journal › Article
-
Mark
A new instruction overlapping technique for improved anti-disassembly and obfuscation of x86 binaries
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2012
-
Mark
A Survey on Fast Correlation Attacks
(
- Contribution to journal › Scientific review
-
Mark
Improved distinguishers for HC-128
(
- Contribution to journal › Article
-
Mark
On Hardware-Oriented Message Authentication
(
- Contribution to journal › Article
-
Mark
Analysis of Xorrotation With Application to an HC-128 Variant
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials
(
- Contribution to journal › Article
-
Mark
Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An Optimal Sampling Technique for Distinguishing Random S-boxes
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2011
-
Mark
Searching for new convolutional codes using the cell broadband engine architecture
(
- Contribution to journal › Article
-
Mark
Grain-128a: a new version of Grain-128 with optional authentication
(
- Contribution to journal › Article
-
Mark
A Technique for Remote Detection of Certain Virtual Machine Monitors
2011) The Third International Conference on Trusted Systems, INTRUST 2011 In Lecture Notes in Computer Science 7222. p.129-137(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
(
- Contribution to journal › Article
-
Mark
Linear Attacks on Stream Ciphers
2011) p.55-85(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Cryptanalysis of the Stream cipher BEAN
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On Hardware-Oriented Message Authentication with Applications Towards RFID
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluation of Some Algorithms for Hardware-Oriented Message Authentication
2011)(
- Book/Report › Report
-
Mark
A New Version of Grain-128 with Authentication
2011) Symmetric Key Encryption Workshop 2011(
- Contribution to conference › Paper, not in proceeding
- 2010
-
Mark
Laboratory instructions as a cause of student dissonance
2010) LTHs 6:e Pedagogiska Inspirationskonferens, 2010(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Security Evaluation of Stream Cipher Enocoro-128v2
2010)(
- Book/Report › Report
-
Mark
Using Coding Techniques to Analyze Weak Feedback Polynomials
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2009
-
Mark
Improving the rainbow attack by reusing colours
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An overview of distinguishing attacks on stream ciphers
(
- Contribution to journal › Article
-
Mark
An efficient state recovery attack on X-FCSR-256
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Another look at weak feedback polynomials in the nonlinear combiner
(
- Contribution to conference › Paper, not in proceeding
- 2008
-
Mark
The Grain family of stream ciphers
2008) p.179-190(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Breaking the F-FCSR-H stream cipher in real time
2008) ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security 5350. p.557-569(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2007
-
Mark
On the problem of finding linear approximations and cryptanalysis of Pomaranch Version 2
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Two General Attacks on Pomaranch-like Keystream Generators
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A key recovery attack on Edon80
2007) ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security 4833. p.568-581(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptanalysis of Achterbahn-Version 2
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptanalysis of Achterbahn-128/80
(
- Contribution to journal › Article
-
Mark
A note on distinguishing attacks
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the Design and Analysis of Stream Ciphers
2007)(
- Thesis › Doctoral thesis (monograph)
-
Mark
Grain - A stream cipher for constrained environments
(
- Contribution to journal › Article
- 2006
-
Mark
Two new attacks on the self-shrinking generator
(
- Contribution to journal › Article
-
Mark
A stream cipher proposal: Grain-128
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2005
-
Mark
Towards a general RC4-like keystream generator
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some attacks on the Bit-search generator
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Plateaued rotation symmetric boolean functions on odd number of variables
2005) First Workshop on Boolean Functions : Cryptography and Applications(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2004
-
Mark
Correlation attacks using a new class of weak feedback polynomials
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On Efficient Implementation of a Search Strategy for Rotation Symmetric Boolean Functions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding