Carl Löndahl
Carl Löndahl
Cryptography, biometry
Verified email at eit.lth.se - Homepage
TitleCited byYear
A new version of McEliece PKC based on convolutional codes
C Löndahl, T Johansson
Information and Communications Security, 461-470, 2012
452012
Solving LPN using covering codes
Q Guo, T Johansson, C Löndahl
International Conference on the Theory and Application of Cryptology and …, 2014
422014
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
C Löndahl, T Johansson, MK Shooshtari, M Ahmadian-Attari, MR Aref
Designs, Codes and Cryptography 80 (2), 359-377, 2016
262016
A survey on fast correlation attacks
M Ågren, C Löndahl, M Hell, T Johansson
Cryptography and Communications, 1-30, 2012
112012
A new algorithm for solving Ring-LPN with a reducible polynomial
Q Guo, T Johansson, C Löndahl
arXiv preprint arXiv:1409.0472, 2014
92014
An improvement to Stern’s algorithm⋆
T Johansson, C Löndahl
92011
Improved algorithms for finding low-weight polynomial multiples in F_2[x] and some cryptographic applications
C Löndahl, T Johansson
Designs, Codes and Cryptography, 1-16, 2014
7*2014
Improved message passing techniques in fast correlation attacks on stream ciphers
M Ågren, M Hell, T Johansson, C Löndahl
2012 7th International Symposium on Turbo Codes and Iterative Information …, 2012
32012
Some notes on code-based cryptography
C Löndahl
Lund University, 2015
22015
A note on the security of the hHB protocol
C Löndahl
arXiv preprint arXiv:1507.07363, 2015
12015
A new algorithm for finding low-weight polynomial multiples and its application to TCHo
T Johansson, C Löndahl
12013
Alternativ till den konventionella laborationsrapporten
M Andersson, M Berg, K Jansson, M Liliebladh, C Löndahl
2013
The system can't perform the operation now. Try again later.
Articles 1–12