Paul Stankovski Wagner
Paul Stankovski Wagner
Associate Professor, Lund University
Verified email at eit.lth.se - Homepage
Title
Cited by
Cited by
Year
A key recovery attack on MDPC with CCA security using decoding errors
Q Guo, T Johansson, P Stankovski
International conference on the theory and application of cryptology and …, 2016
1482016
Coded-BKW: Solving LWE Using Lattice Codes
Q Guo, T Johansson, P Stankovski
Advances in Cryptology--CRYPTO 2015, 23-42, 2015
662015
Greedy distinguishers and nonrandomness detectors
P Stankovski
International Conference on Cryptology in India, 210-226, 2010
632010
A reaction attack on the QC-LDPC McEliece cryptosystem
T Fabšič, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson
International workshop on post-quantum cryptography, 51-68, 2017
552017
Error amplification in code-based cryptography
A Nilsson, T Johansson, PS Wagner
Cryptology ePrint Archive, 2018
262018
An efficient state recovery attack on X-FCSR-256
P Stankovski, M Hell, T Johansson
International Workshop on Fast Software Encryption, 23-37, 2009
172009
Coded-BKW with sieving
Q Guo, T Johansson, E Mårtensson, P Stankovski
International Conference on the Theory and Application of Cryptology and …, 2017
162017
Improved distinguishers for HC-128
P Stankovski, S Ruj, M Hell, T Johansson
Designs, Codes and Cryptography 63 (2), 225-240, 2012
152012
A key recovery reaction attack on QC-MDPC
Q Guo, T Johansson, PS Wagner
IEEE Transactions on Information Theory 65 (3), 1845-1861, 2018
82018
An efficient state recovery attack on the X-FCSR family of stream ciphers
P Stankovski, M Hell, T Johansson
Journal of cryptology 27 (1), 1-22, 2014
82014
On the asymptotics of solving the LWE problem using coded-BKW with sieving
Q Guo, T Johansson, E Mårtensson, PS Wagner
IEEE Transactions on Information Theory 65 (8), 5243-5259, 2019
72019
Improved greedy nonrandomness detectors for stream ciphers
L Karlsson, M Hell, P Stankovski
International Conference on Information Systems Security and Privacy, 225-232, 2017
72017
A generalized birthday approach for efficiently finding linear relations in ℓ -sequences
H Wang, P Stankovski, T Johansson
Designs, Codes and Cryptography 74 (1), 41-57, 2015
72015
Information set decoding with soft information and some cryptographic applications
Q Guo, T Johansson, E Mårtensson, P Stankovski
2017 IEEE International Symposium on Information Theory (ISIT), 1793-1797, 2017
62017
eavesrop: Listening for rop payloads in data streams
C Jämthagen, L Karlsson, P Stankovski, M Hell
International Conference on Information Security, 413-424, 2014
42014
Guarding the guards: Accountable authorities in vanets
J Brorsson, PS Wagner, M Hell
2018 IEEE Vehicular Networking Conference (VNC), 1-4, 2018
32018
Cryptanalysis of Selected Stream Ciphers
P Stankovski
Lund University, 2013
32013
Some cryptanalytic and coding-theoretic applications of a soft stern algorithm
Q Guo, T Johansson, E Mårtensson, PS Wagner
Advances in Mathematics of Communications 13 (4), 559, 2019
22019
Not so greedy: Enhanced subset exploration for nonrandomness detectors
L Karlsson, M Hell, P Stankovski
International Conference on Information Systems Security and Privacy, 273-294, 2017
22017
An optimal sampling technique for distinguishing random S-boxes
P Stankovski, M Hell
2012 IEEE International Symposium on Information Theory Proceedings, 846-850, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20