1 – 250 of 272
- show: 250
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2023
-
Mark
Post-Quantum Cryptography : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings
(2023) The 14th International Conference on Post-Quantum Cryptography In Lecture Notes in Computer Science 14154.
- Book/Report › Conference proceeding (editor)
-
Mark
Correlation Attacks on Stream Ciphers
2023) p.143-154(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Preface
2023) Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, Proceedings In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14154 LNCS.(
- Chapter in Book/Report/Conference proceeding › Preface to conference proceeding
-
Mark
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article
-
Mark
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
2023)(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
Politikerna struntar i klimatforskningen : 420 forskare: Regeringens politik är katastrofal – nu måste fler svenskar kräva en omställning
2023) In Aftonbladet Debatt(
- Contribution to specialist publication or newspaper › Newspaper article
-
Mark
Sveriges utsläpp måste minska nu, regeringen : 531 forskare: Annars är sveket monumentalt – ni kan inte säga att ni inte visste
2023) In Aftonbladet(
- Contribution to specialist publication or newspaper › Newspaper article
- 2022
-
Mark
Post-Quantum Cryptography : 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings
- Book/Report › Conference proceeding (editor)
-
Mark
Preface
2022) 13th International Conference on Post-Quantum Cryptography, PQCrypto 2022 In Lecture Notes in Computer Science 13512 LNCS.(
- Contribution to journal › Debate/Note/Editorial
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
-
Mark
Attacks on the Firekite Cipher
(
- Contribution to journal › Article
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
(
- Contribution to journal › Article
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
- 2021
-
Mark
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS
2021) 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021 In Lecture Notes in Computer Science 13093. p.33-62(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved guess-and-determine and distinguishing attacks on snow-v
(
- Contribution to journal › Article
-
Mark
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article
-
Mark
SNOW-Vi : An extreme performance variant of SNOW-V for lower grade CPUs
2021) 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021 p.261-272(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
2021) 2021 IEEE International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEAD, Round 3 Tweak and Motivation
2021)(
- Book/Report › Report
-
Mark
Improvements on Making BKW Practical for Solving LWE
(
- Contribution to journal › Article
- 2020
-
Mark
An overview of cryptographic primitives for possible use in 5G and beyond
(
- Contribution to journal › Scientific review
-
Mark
A New Decryption Failure Attack Against HQC
2020) 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020 In Lecture Notes in Computer Science 12491. p.353-382(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Solving LPN Using Covering Codes
(
- Contribution to journal › Article
-
Mark
Spectral analysis of ZUC-256
(
- Contribution to journal › Article
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Making the BKW Algorithm Practical for LWE
2020) International Conference on Cryptology in India - INDOCRYPT 2020 In Lecture Notes in Computer Science 12578. p.417-439(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
A new birthday-type algorithm for attacking the fresh re-keying countermeasure
(
- Contribution to journal › Article
-
Mark
Vectorized linear approximations for attacks on SNOW 3G
2019) 27th Annual Fast Software Encryption Conference, FSE 2020 In IACR Transactions on Symmetric Cryptology 2019(4). p.249-271(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A novel CCA attack using decryption errors against LAC
2019) 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11921 LNCS. p.82-111(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
2019)(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
Improved Decoders for p-ary MDPC
2019) 11th International Workshop on Coding and Cryptography (WCC) 2019(
- Contribution to conference › Paper, not in proceeding
-
Mark
A Key Recovery Reaction Attack on QC-MDPC
(
- Contribution to journal › Article
-
Mark
Sweden beyond oil : Nuclear commitments and solar options
2019) p.141-162(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
(
- Contribution to journal › Article
-
Mark
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
(
- Contribution to journal › Article
-
Mark
Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A new SNOW stream cipher called SNOW-V
(
- Contribution to journal › Article
-
Mark
An AEAD Variant of the Grain Stream Cipher
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes
2019) 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC), 2019 In Lecture Notes in Computer Science 11443. p.565-598(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
"Vi klimatforskare stödjer Greta och skolungdomarna"
2019) In Dagens nyheter (DN debatt)(
- Contribution to specialist publication or newspaper › Newspaper article
- 2018
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article
-
Mark
Ouroboros-E : An Efficient Lattice-based Key-Exchange Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Coded-BKW with Sieving
2017) 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2017 In Lecture Notes in Computer Science 10624. p.323-346(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Information Set Decoding with Soft Information and some cryptographic applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Editorial : Special issue on coding and cryptography
(
- Contribution to journal › Debate/Note/Editorial
-
Mark
A reaction attack on the QC-LDPC mceliece cryptosystem
2017) 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10346 LNCS. p.51-68(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
A p-ary MDPC scheme.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A key recovery attack on MDPC with CCA security using decoding errors
2016) 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2016 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10031 LNCS. p.789-815(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes
(
- Contribution to journal › Article
-
Mark
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
(
- Contribution to journal › Article
- 2015
-
Mark
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial
(
- Contribution to journal › Article
-
Mark
A generalized birthday approach for efficiently finding linear relations in l-sequences
(
- Contribution to journal › Article
-
Mark
Coded-BKW: Solving LWE Using Lattice Codes.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications
(
- Contribution to journal › Article
-
Mark
Solving LPN Using Covering Codes
2014) 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt) 8873. p.1-20(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
(
- Contribution to journal › Article
-
Mark
Multi Cylinder Partially Premixed Combustion Performance Using Commercial Light-Duty Engine Hardware
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2013
-
Mark
Advances in Cryptology -- EUROCRYPT 2013
Johansson, Thomas LU and Phong Q., Nguyen (2013)
- Book/Report › Anthology (editor)
-
Mark
A new algorithm for finding low-weight polynomial multiples and its application to TCHo
2013) International Workshop on Coding and Cryptography, WCC 2013(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Key Recovery Attack on the BEAN Stream Cipher
2013) In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96A(6). p.1437-1444(
- Contribution to journal › Article
- 2012
-
Mark
Global Energy Assessment: Towards a Sustainable Future
Johansson, Thomas B LU (2012)
- Book/Report › Anthology (editor)
-
Mark
Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques
- Book/Report › Anthology (editor)
-
Mark
A new version of McEliece PKC based on convolutional codes
2012) International Conference on Information and Communications Security In Lecture Notes in Computer Science 7618. p.461-470(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some results on fast algebraic attacks and higher-order non-linearities
(
- Contribution to journal › Article
-
Mark
On Hardware-Oriented Message Authentication
(
- Contribution to journal › Article
-
Mark
Analysis of Xorrotation With Application to an HC-128 Variant
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved distinguishers for HC-128
(
- Contribution to journal › Article
-
Mark
A Survey on Fast Correlation Attacks
(
- Contribution to journal › Scientific review
-
Mark
Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials
(
- Contribution to journal › Article
-
Mark
Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
2012) The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy Primer
2012) p.99-150(
- Chapter in Book/Report/Conference proceeding › Book chapter
- 2011
-
Mark
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
(
- Contribution to journal › Article
-
Mark
Linear Attacks on Stream Ciphers
2011) p.55-85(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
On equivalence classes of Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
An improvement to Stern's algorithm
2011)(
- Book/Report › Report
-
Mark
A note on fast algebraic attacks and higher order nonlinearities
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Evaluation of Some Algorithms for Hardware-Oriented Message Authentication
2011)(
- Book/Report › Report
-
Mark
On Hardware-Oriented Message Authentication with Applications Towards RFID
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128a: a new version of Grain-128 with optional authentication
(
- Contribution to journal › Article
-
Mark
A New Version of Grain-128 with Authentication
2011) Symmetric Key Encryption Workshop 2011(
- Contribution to conference › Paper, not in proceeding
- 2010
-
Mark
Turbocharged HCCI Engine, Improving Efficiency and Operating Range
2010)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Security Evaluation of Stream Cipher Enocoro-128v2
2010)(
- Book/Report › Report
-
Mark
Turbocharging to extend HCCI Operating Range in a Multi Cylinder Engine- Benefits and Limitations
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Extracting Cylinder Individual Combustion Data from a High Precision Torque Sensor
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
HCCI Heat Release Data for Combustion Simulation, based on Results from a Turbocharged Multi Cylinder Engine
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2009
-
Mark
Mapping insect defoliation in Scots pine with MODIS time-series data
(
- Contribution to journal › Article
-
Mark
Improving the rainbow attack by reusing colours
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An overview of distinguishing attacks on stream ciphers
(
- Contribution to journal › Article
-
Mark
An efficient state recovery attack on X-FCSR-256
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Effect of Intake Temperature in a Turbocharged Multi Cylinder Engine operating in HCCI mode
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
HCCI Operating Range in a Turbo-charged Multi Cylinder Engine with VVT and Spray-Guided DI
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Effect of Intake Temperature in a Turbocharged Multi Cylinder Engine Operating in HCCI Mode
(
- Contribution to journal › Article
-
Mark
Thermodynamic modeling and control of a negative valve overlap turbo HCCI engine
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Control of a turbo charged NVO HCCI engine using a model based approach
2009) 2009 IFAC Workshop on Engine and Powertrain Control, Simulation and Modeling, E-COSM'09 In IFAC Proceedings Volumes 42. p.79-86(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Age and epiphytic lichen diversity of the dwarf shrub Helianthemum oelandicum on the island of Öland, Sweden
(
- Contribution to journal › Article
-
Mark
Cell-cell communication between adipocytes and pancreatic beta-cells in acoustically levitated droplets
(
- Contribution to journal › Article
- 2008
-
Mark
Breaking the F-FCSR-H stream cipher in real time
2008) ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security 5350. p.557-569(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
One-sweep APP decoding algorithm for binary block codes with reduced trellis memory
2008) p.88-93(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
European renewable energy policy at crossroads-Focus on electricity support mechanisms
(
- Contribution to journal › Article
-
Mark
Zero carbon energy systems
2008)(
- Book/Report › Report
-
Mark
The Grain family of stream ciphers
2008) p.179-190(
- Chapter in Book/Report/Conference proceeding › Book chapter
- 2007
-
Mark
On the problem of finding linear approximations and cryptanalysis of Pomaranch Version 2
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A key recovery attack on Edon80
2007) ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security 4833. p.568-581(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptanalysis of Achterbahn-Version 2
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A linear distinguishing attack on SCREAM
(
- Contribution to journal › Article
-
Mark
Cryptanalysis of Achterbahn-128/80
(
- Contribution to journal › Article
-
Mark
Two General Attacks on Pomaranch-like Keystream Generators
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A note on distinguishing attacks
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain - A stream cipher for constrained environments
(
- Contribution to journal › Article
-
Mark
A framework for chosen IV statistical analysis of stream ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Interstitial photodynamic therapy for primary prostate cancer incorporating realtime treatment dosimetry
2007) Optical Methods for Tumor Treatment and Detection: Mechanisms and Techniques in Photodynamic Therapy XVI 6427. p.4270-4270(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2006
-
Mark
Two new attacks on the self-shrinking generator
(
- Contribution to journal › Article
-
Mark
Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers
(
- Contribution to journal › Article
-
Mark
Cryptanalysis of Achterbahn
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptanalysis of pomaranch
(
- Contribution to journal › Article
-
Mark
A stream cipher proposal: Grain-128
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Potentials of Renewable Energy
2006)(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
In vivo measurement of parameters of dosimetric importance during interstitial photodynamic therapy of thick skin tumors
(
- Contribution to journal › Article
-
Mark
Photodynamic therapy of nodular basal cell carcinoma with multifiber contact light delivery
(
- Contribution to journal › Article
- 2005
-
Mark
Authentication codes
2005)(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Det globala energisystemet - hur blir det hållbart?
2005) p.250-250(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
A new distinguisher for clock controlled stream ciphers
(
- Contribution to journal › Article
-
Mark
Some attacks on the Bit-search generator
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast computation of large distributions and its cryptographic applications
(
- Contribution to journal › Article
-
Mark
Management and policy for sustainable consumption and production
(
- Contribution to journal › Debate/Note/Editorial
-
Mark
Snow 2.0 IP core for trusted hardware
2005) 2005 International Conference on Field Programmable Logic and Applications (FPL) 2005. p.281-286(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Balancing BlockRAM and distributed RAM
2005) Swedish System-on-Chip Conference (SSoCC'05)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Clinical system for interstitial photodynamic therapy with combined on-line dosimetry measurements
(
- Contribution to journal › Article
-
Mark
"White and Green": Comparison of market-based instruments to promote energy efficiency
(
- Contribution to journal › Article
-
Mark
"White and Green": Conclusions and Recommendations
2005)(
- Book/Report › Report
- 2004
-
Mark
A Global Clean Cooking Fuel Initiative
(
- Contribution to journal › Article
-
Mark
The Imperative of Energy for Sustainable Development
(
- Contribution to journal › Article
-
Mark
Globalt perspektiv på energi i byggd miljö. Nu krävs energisystem för klimatvänlig tillväxt
(
- Contribution to journal › Article
-
Mark
China’s National Energy Plan: Some Energy Strategy Considerations
(
- Contribution to journal › Article
-
Mark
A new simple technique to attack filter generators and related ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A memory-efficient optimal APP symbol-elecoding algorithm for linear block codes
(
- Contribution to journal › Article
-
Mark
Energy and the Challenge of Sustainability Overview Update
2004)(
- Book/Report › Book
-
Mark
Policies for renewable energy in the European Union and its member states: an overview
(
- Contribution to journal › Article
-
Mark
An improved correlation attack on A5/1
2004) Selected Areas in Cryptography. 11th International Workshop, SAC 2004. Revised Selected Papers In Lecture Notes in Computer Science 3357. p.1-18(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Correlation attacks using a new class of weak feedback polynomials
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy for sustainable development in China
(
- Contribution to journal › Article
-
Mark
Technological leapfrogging - a strategic pathway to modernisation of the Chinese iron and steel industry?
(
- Contribution to journal › Article
-
Mark
New constructions of resilient and correlation immune Boolean functions achieving the upper bound on nonlinearity
(
- Contribution to journal › Article
-
Mark
The Potentials of Renewable Energy
2004) p.40-40(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Policy Recommendations for Renewable Energies
2004) p.19-19(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Lidar remote-sensing assessment of the cultural heritage using laser-induced fluorescence and laser-induced break-down spectroscopy
2004) Air Pollution and Cultural Heritage(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2003
-
Mark
Fast Software Encryption, FSE 2003
- Book/Report › Conference proceeding (editor)
-
Mark
Progress in Cryptology - INDOCRYPT 2003
- Book/Report › Conference proceeding (editor)
-
Mark
Analysis and design of modern stream ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Analysis and design of modern stream ciphers (invited paper)
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Transforming coal for sustainability: a strategy for China
(
- Contribution to journal › Article
-
Mark
A new version of the stream cipher SNOW
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A construction of resilient functions with high nonlinearity
(
- Contribution to journal › Article
-
Mark
A linear distinguishing attack on Scream
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Another attack on A5/1
(
- Contribution to journal › Article
-
Mark
Predicting the shrinking generator with fixed connections
2003) EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques 2656. p.330-344(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A note on the selfshrinking generator
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Om järnvägens miljöeffekter
(
- Contribution to journal › Article
-
Mark
Tissue temperature measurements during interstitial laser therapy using Cr3+-doped crystals at the fiber tip
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Screening of nucleation conditions using levitated drops for protein crystallization
(
- Contribution to journal › Article
-
Mark
Intergrated system for interstitial photodynamic therapy
(
- Contribution to journal › Article
-
Mark
Fluorescence lidar imaging of the cathedral and baptistery of Parma
(
- Contribution to journal › Article
-
Mark
Integrated system for interstitial photodynamic therapy
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Lithotypes characterization with a fluorescence lidar imaging system using a multi-wavelength excitation source
2003) SPIE Conference on Performance and Control of Next-Generation Communication Networks, 2003 4886. p.151-151(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2002
-
Mark
Applications of laser spectroscopy to analytical chemistry, environmental monitoring and medicine
2002) In Lund Reports on Atomic Physics(
- Thesis › Doctoral thesis (compilation)
-
Mark
Bringing it all together: integrating sustainable development and energy policy
2002) In ESMAP Energy and Development Report 2001: Energy and the Environment(
- Book/Report › Report
-
Mark
Energy for Sustainable Development – A Policy Agenda for Biomass
2002) p.4-4(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy for sustainable development in China
2002)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Construction of cryptographically important Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Distinguishing attacks on SOBER-t16 and t32
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Theoretical analysis of a correlation attack based on convolutional codes
(
- Contribution to journal › Article
-
Mark
Kultursociologi
2002)(
- Book/Report › Book
-
Mark
On the complexity of some cryptographic problems based on the general decoding problem
(
- Contribution to journal › Article
-
Mark
A fast correlation attack on LILI-128
(
- Contribution to journal › Article
-
Mark
New techniques for decoding codes in rank metric and its cryptographic applications
(
- Contribution to journal › Article
-
Mark
A policy agenda to promote energy for sustainable development
(
- Contribution to journal › Article
-
Mark
Feasibility study of a system for combined light dosimetry and interstitial photodynamic treatment of massive tumors
(
- Contribution to journal › Article
-
Mark
Integrated system for interstitial photodynamic therapy
2002) Conference on Advanced Optical Devices, Technologies, and Medical Applications 5123. p.293-302(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Diode Laser-Mediated ALA-PDT Guided by Laser-Induced Fluorescence Imaging
2002) In Lund Reports in Atomic Physics(
- Book/Report › Report
- 2001
-
Mark
Correlation attacks on stream ciphers over GF(2^n)
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Another attack on A5/1
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Special issue on the work of the Working Group on Energy Strategies and Technologies of the China Council for International Cooperation on Environment and Development
(
- Contribution to journal › Article
-
Mark
Energy for sustainable development in China: an overview of approach and work carried out by the Working Group on Energy Strategies and Technologies of the China Council for International Cooperation on Environment and Development
(
- Contribution to journal › Article
-
Mark
Forests and energy
2001)(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Almost k-wise independent sample spaces and their cryptologic applications
(
- Contribution to journal › Article
-
Mark
Results related to the upper bound on nonlinearity for resilient and correlation immune Boolean functions
(
- Contribution to conference › Paper, not in proceeding
-
Mark
Proceedings of the 7th European Roundtable on Cleaner Production, 2-4 May 2001, Lund
2001)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy for the New Millennium
(
- Contribution to journal › Article
-
Mark
Fluorescence lidar imaging of historical monuments
(
- Contribution to journal › Article
-
Mark
Lidar remote sensing of the Parma Cathedral and Baptistery
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2000
-
Mark
Fast correlation attacks through reconstruction of linear polynomials
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some results on correlations in the Bluetooth stream cipher
(
- Contribution to conference › Paper, not in proceeding
-
Mark
A construction of resilient functions with high nonlinearity
2000) IEEE International Symposium on Information Theory (ISIT), 2000 In IEEE International Symposium on Information Theory p.184-184(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A construction of resilient functions with high nonlinearity
(
- Contribution to conference › Paper, not in proceeding
-
Mark
Theoretical analysis of a correlation attack based on convolutional codes
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
SNOW - A new stream cipher
2000) First open Nessie Workshop(
- Contribution to conference › Paper, not in proceeding
-
Mark
A simple algorithm for fast correlation attacks on stream ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energiförsörjning
2000) In Nationalencyklopedin(
- Contribution to journal › Article
-
Mark
Alternative methods providing enhanced sensitivity and selectivity in capillary electroseparation experiments
(
- Contribution to journal › Article
-
Mark
Airborne cell analysis
(
- Contribution to journal › Article
-
Mark
Interstitial photodynamic therapy - diagnostic measurements and treatment in rat malignant experimental tumours
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Experiments on stony monument monitoring by laser-induced fluorescence
(
- Contribution to journal › Article
- 1999
-
Mark
Further results on asymmetric authentication schemes
(
- Contribution to journal › Article
-
Mark
Improved fast correlation attacks on stream ciphers via convolutional codes
1999) International Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ’99 1592. p.347-362(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Further results on the relation between nonlinearity and resiliency of Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast correlation attacks based on turbo code techniques
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Correlation attacks, convolutional codes, and iterative decoding
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Bark- och vedlevande lavar i ädellövskog på ön Jungfrun
(
- Contribution to specialist publication or newspaper › Specialist publication article
- 1998
-
Mark
Reduced complexity correlation attacks on two clock-controlled generators
1998) International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT’98 1514. p.342-356(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Correlation attacks on stream ciphers and related decoding problems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A simple one sweep algorithm for optimal APP symbol decoding of linear block codes
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A simple one sweep algorithm for optimal APP symbol decoding of linear block codes
(
- Contribution to journal › Article
-
Mark
On some cryptographic problems based on the general decoding problem
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On key and message equivocations in secrecy systems
(
- Contribution to journal › Article
-
Mark
Fluorescence imaging of historical buildings by lidar remote sensing
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1997
-
Mark
Bucket hashing with a small key size'
1997) nternational Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ’97 1233. p.149-162(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Codes combining error detection and authentication
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Almost k-wise independent sample spaces and their cryptologic applications
1997) International Conference on the Theory and Application of Cryptographic Techniques - EUROCRYPT'97 1233. p.409-421(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Coding problems of cryptography or codesets vs. codewords
(
- Contribution to conference › Paper, not in proceeding
- 1996
-
Mark
Relations between error-correcting codes, authentication
1996) Computer Security, Cryptology and Coding theory research program, Cambridge(
- Contribution to conference › Abstract
-
Mark
Universal hash functions from exponential sums over finite fields and Galois rings
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the cardinality of systematic authentication codes via error-correcting codes
(
- Contribution to journal › Article
-
Mark
Real-time fluorescence imaging in analytical chemistry
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1995
-
Mark
Authentication codes for non-trusting parties obtained from rank metric codes
(
- Contribution to journal › Article
-
Mark
Constructions of asymmetric authentication systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Authentication codes protecting against collusion attacks
(
- Contribution to conference › Paper, not in proceeding
-
Mark
On A2-codes including arbiter's attacks
1995) Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94 950. p.456-461(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1994
-
Mark
A shift register construction of unconditionally secure authentication codes
(
- Contribution to journal › Article
-
Mark
Lower bounds on the probability of deception in authentication with arbitration
(
- Contribution to journal › Article
-
Mark
A2-codes and codes for the rank metric
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Contributions to unconditionally secure authentication
1994)(
- Thesis › Doctoral thesis (monograph)
-
Mark
Secrecy codes for source messages of finite length
(
- Contribution to conference › Paper, not in proceeding
-
Mark
Bioenergy - European Status and Prospects
1994) Paper presented at the EUREKA Technology Conference(
- Contribution to conference › Paper, not in proceeding
-
Mark
Environmental challenges to the energy industries
1994)(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Användning av biobränslen för att minska utsläppen av koldioxid i Sverige
1994) In SOU (Bilaga nr 4 i Rapport från Klimatdelegationen)(
- Book/Report › Report
- 1993
-
Mark
On the construction of perfect authentication codes that permit arbitration
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Relations between authentication codes and error-correcting codes
(
- Contribution to conference › Paper, not in proceeding
-
Mark
Lower bounds on the probability of deception in authentication
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the relation between A-codes and codes correcting independent errors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the construction of universal families of hash functions via geometric codes and concatenation
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1991
-
Mark
A construction of authentication codes with total secrecy
(
- Contribution to conference › Paper, not in proceeding
- 1979
-
Mark
Aerosolsammansättning i ett renluftsområde
1979) In Slutrapport för anslag SNV 7-147: projekt "Aerosolsammansättning"(
- Book/Report › Report
- 1978
-
Mark
Grundämnessammansättning i olika partikelstorleksfraktioner av den atmosfäriska aerosolen
1978) In Lägesrapport för anslag SNV 7-147 inom projektet "AEROSOLSAMMANSÄTTNING" juli 1975 - januari 1976(
- Book/Report › Report