Följ
Paul Stankovski Wagner
Paul Stankovski Wagner
Associate Professor, Lund University
Verifierad e-postadress på eit.lth.se - Startsida
Titel
Citeras av
Citeras av
År
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
Q Guo, T Johansson, P Stankovski
International conference on the theory and application of cryptology and …, 2016
2032016
Coded-BKW: Solving LWE Using Lattice Codes
Q Guo, T Johansson, P Stankovski
Advances in Cryptology--CRYPTO 2015, 23-42, 2015
862015
A Reaction Attack on the QC-LDPC McEliece Cryptosystem
T Fabšič, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson
International workshop on post-quantum cryptography, 51-68, 2017
712017
Greedy Distinguishers and Nonrandomness Detectors
P Stankovski
International Conference on Cryptology in India, 210-226, 2010
712010
Error Amplification in Code-based Cryptography
A Nilsson, T Johansson, P Stankovski Wagner
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1 …, 2018
342018
A Key Recovery Reaction Attack on QC-MDPC
Q Guo, T Johansson, PS Wagner
IEEE Transactions on Information Theory 65 (3), 1845-1861, 2018
272018
Coded-BKW with Sieving
Q Guo, T Johansson, E Mårtensson, P Stankovski
International Conference on the Theory and Application of Cryptology and …, 2017
232017
An Efficient State Recovery Attack on X-FCSR-256
P Stankovski, M Hell, T Johansson
International Workshop on Fast Software Encryption, 23-37, 2009
202009
Improved Distinguishers for HC-128
P Stankovski, S Ruj, M Hell, T Johansson
Designs, Codes and Cryptography 63 (2), 225-240, 2012
172012
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Q Guo, T Johansson, E Mårtensson, PS Wagner
IEEE Transactions on Information Theory 65 (8), 5243-5259, 2019
152019
Making the BKW Algorithm Practical for LWE
A Budroni, Q Guo, T Johansson, E Mårtensson, PS Wagner
International Conference on Cryptology in India, 417-439, 2020
132020
On the Sample Complexity of Solving LWE using BKW-Style Algorithms
Q Guo, E Mårtensson, PS Wagner
2021 IEEE International Symposium on Information Theory (ISIT), 2405-2410, 2021
92021
Improved greedy nonrandomness detectors for stream ciphers
L Karlsson, M Hell, P Stankovski
International Conference on Information Systems Security and Privacy, 225-232, 2017
92017
Papr: Publicly auditable privacy revocation for anonymous credentials
J Brorsson, B David, L Gentile, E Pagnin, PS Wagner
Cryptographers’ Track at the RSA Conference, 163-190, 2023
82023
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
P Stankovski, M Hell, T Johansson
Journal of cryptology 27 (1), 1-22, 2014
82014
Information Set Decoding with Soft Information and Some Cryptographic Applications
Q Guo, T Johansson, E Mårtensson, P Stankovski
2017 IEEE International Symposium on Information Theory (ISIT), 1793-1797, 2017
72017
A Generalized Birthday Approach for Efficiently Finding Linear Relations in -sequences
H Wang, P Stankovski, T Johansson
Designs, Codes and Cryptography 74 (1), 41-57, 2015
72015
Not so greedy: Enhanced Subset Exploration for Nonrandomness Detectors
L Karlsson, M Hell, P Stankovski
International Conference on Information Systems Security and Privacy, 273-294, 2017
62017
eavesROP: Listening for ROP Payloads in Data Streams
C Jämthagen, L Karlsson, P Stankovski, M Hell
International Conference on Information Security, 413-424, 2014
62014
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
Q Guo, T Johansson, E Mårtensson, PS Wagner
Advances in Mathematics of Communications 13 (4), 559, 2019
52019
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20