Paul Stankovski Wagner
Paul Stankovski Wagner
Associate Professor, Lund University
Verified email at eit.lth.se - Homepage
Title
Cited by
Cited by
Year
A key recovery attack on MDPC with CCA security using decoding errors
Q Guo, T Johansson, P Stankovski
International conference on the theory and application of cryptology and …, 2016
1562016
Coded-BKW: Solving LWE Using Lattice Codes
Q Guo, T Johansson, P Stankovski
Advances in Cryptology--CRYPTO 2015, 23-42, 2015
702015
Greedy distinguishers and nonrandomness detectors
P Stankovski
International Conference on Cryptology in India, 210-226, 2010
632010
A reaction attack on the QC-LDPC McEliece cryptosystem
T Fabšič, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson
International workshop on post-quantum cryptography, 51-68, 2017
582017
Error amplification in code-based cryptography
A Nilsson, T Johansson, PS Wagner
Cryptology ePrint Archive, 2018
262018
Coded-BKW with sieving
Q Guo, T Johansson, E Mårtensson, P Stankovski
International Conference on the Theory and Application of Cryptology and …, 2017
182017
Improved distinguishers for HC-128
P Stankovski, S Ruj, M Hell, T Johansson
Designs, Codes and Cryptography 63 (2), 225-240, 2012
172012
An efficient state recovery attack on X-FCSR-256
P Stankovski, M Hell, T Johansson
International Workshop on Fast Software Encryption, 23-37, 2009
172009
On the asymptotics of solving the LWE problem using coded-BKW with sieving
Q Guo, T Johansson, E Mårtensson, PS Wagner
IEEE Transactions on Information Theory 65 (8), 5243-5259, 2019
102019
A key recovery reaction attack on QC-MDPC
Q Guo, T Johansson, PS Wagner
IEEE Transactions on Information Theory 65 (3), 1845-1861, 2018
102018
An efficient state recovery attack on the X-FCSR family of stream ciphers
P Stankovski, M Hell, T Johansson
Journal of cryptology 27 (1), 1-22, 2014
82014
Improved greedy nonrandomness detectors for stream ciphers
L Karlsson, M Hell, P Stankovski
International Conference on Information Systems Security and Privacy, 225-232, 2017
72017
A generalized birthday approach for efficiently finding linear relations in ℓ -sequences
H Wang, P Stankovski, T Johansson
Designs, Codes and Cryptography 74 (1), 41-57, 2015
72015
Information set decoding with soft information and some cryptographic applications
Q Guo, T Johansson, E Mårtensson, P Stankovski
2017 IEEE International Symposium on Information Theory (ISIT), 1793-1797, 2017
62017
Making the BKW Algorithm Practical for LWE
A Budroni, Q Guo, T Johansson, E Mårtensson, PS Wagner
International Conference on Cryptology in India, 417-439, 2020
42020
eavesrop: Listening for rop payloads in data streams
C Jämthagen, L Karlsson, P Stankovski, M Hell
International Conference on Information Security, 413-424, 2014
42014
On the Sample Complexity of solving LWE using BKW-Style Algorithms
Q Guo, E Mårtensson, PS Wagner
arXiv preprint arXiv:2102.02126, 2021
32021
Some cryptanalytic and coding-theoretic applications of a soft stern algorithm
Q Guo, T Johansson, E Mårtensson, PS Wagner
Advances in Mathematics of Communications 13 (4), 559, 2019
32019
Guarding the guards: Accountable authorities in vanets
J Brorsson, PS Wagner, M Hell
2018 IEEE Vehicular Networking Conference (VNC), 1-4, 2018
32018
Cryptanalysis of Selected Stream Ciphers
P Stankovski
Lund University, 2013
32013
The system can't perform the operation now. Try again later.
Articles 1–20