Martin Hell
Martin Hell
Associate Professor, Lund University
Verifierad e-postadress på eit.lth.se
Titel
Citeras av
Citeras av
År
Grain: a stream cipher for constrained environments
M Hell, T Johansson, W Meier
International Journal of Wireless and Mobile Computing 2 (1), 86-93, 2007
6262007
A stream cipher proposal: Grain-128
M Hell, T Johansson, A Maximov, W Meier
Information Theory, 2006 IEEE International Symposium on, 1614-1618, 2006
2892006
The Grain family of stream ciphers
M Hell, T Johansson, A Maximov, W Meier
New Stream Cipher Designs, 179-190, 2008
2502008
Grain-128a: a new version of Grain-128 with optional authentication
M Ågren, M Hell, T Johansson, W Meier
International Journal of Wireless and Mobile Computing 5 (1), 48-59, 2011
2172011
Plateaued rotation symmetric Boolean functions on odd number of variables
A Maximov, M Hell, S Maitra
First Workshop on Boolean Functions: Cryptography and Applications, 2005
682005
Breaking the F-FCSR-H stream cipher in real time
M Hell, T Johansson
International Conference on the Theory and Application of Cryptology and …, 2008
652008
Towards a general RC4-like keystream generator
G Gong, KC Gupta, M Hell, Y Nawaz
International Conference on Information Security and Cryptology, 162-174, 2005
622005
Espresso: A stream cipher for 5G wireless communication systems
E Dubrova, M Hell
Cryptography and Communications 9 (2), 273-289, 2017
582017
An overview of distinguishing attacks on stream ciphers
M Hell, T Johansson, L Brynielsson
Cryptography and Communications 1 (1), 71-94, 2009
422009
On efficient implementation of search strategy for rotation symmetric Boolean functions
M Hell, E Maximov, S Maitra
In Ninth International Workshop on Algebraic and Combinatoral Coding Theory …, 2004
402004
Grain-a stream cipher for constrained environments.” eSTREAM, ECRYPT Stream Cipher
M Hell, T Johansson, W Meier
342005
A new version of Grain-128 with authentication
M Ågren, M Hell, T Johansson, W Meier
Workshop record of SKEW, 2011
332011
A note on distinguishing attacks
H Englund, M Hell, T Johansson
2007 IEEE Information Theory Workshop on Information Theory for Wireless …, 2007
282007
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
M Hell, T Johansson
Journal of cryptology 24 (3), 427-445, 2011
252011
Two new attacks on the self-shrinking generator
M Hell, T Johansson
IEEE Transactions on Information Theory 52 (8), 3837-3843, 2006
252006
Visual cryptography and obfuscation: A use-case for decrypting and deobfuscating information using augmented reality
P Lantz, B Johansson, M Hell, B Smeets
International Conference on Financial Cryptography and Data Security, 261-273, 2015
192015
On hardware-oriented message authentication with applications towards RFID
M Ågren, M Hell, T Johansson
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
192011
Blockchain-based publishing layer for the Keyless Signing Infrastructure
C Jämthagen, M Hell
2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016
182016
A new instruction overlapping technique for anti-disassembly and obfuscation of x86 binaries
C Jämthagen, P Lantz, M Hell
2013 Workshop on Anti-malware Testing Research, 1-9, 2013
182013
An efficient state recovery attack on X-FCSR-256
P Stankovski, M Hell, T Johansson
Fast Software Encryption, 23-37, 2009
172009
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20