Follow
Paul Stankovski Wagner
Paul Stankovski Wagner
Associate Professor, Lund University
Verified email at eit.lth.se - Homepage
Title
Cited by
Cited by
Year
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
Q Guo, T Johansson, P Stankovski
International conference on the theory and application of cryptology and …, 2016
1772016
Coded-BKW: Solving LWE Using Lattice Codes
Q Guo, T Johansson, P Stankovski
Advances in Cryptology--CRYPTO 2015, 23-42, 2015
782015
A Reaction Attack on the QC-LDPC McEliece Cryptosystem
T Fabšič, V Hromada, P Stankovski, P Zajac, Q Guo, T Johansson
International workshop on post-quantum cryptography, 51-68, 2017
662017
Greedy Distinguishers and Nonrandomness Detectors
P Stankovski
International Conference on Cryptology in India, 210-226, 2010
662010
Error Amplification in Code-Based Cryptography
A Nilsson, T Johansson, PS Wagner
Cryptology ePrint Archive, 2018
292018
Coded-BKW with Sieving
Q Guo, T Johansson, E Mårtensson, P Stankovski
International Conference on the Theory and Application of Cryptology and …, 2017
202017
An Efficient State Recovery Attack on X-FCSR-256
P Stankovski, M Hell, T Johansson
International Workshop on Fast Software Encryption, 23-37, 2009
182009
A Key Recovery Reaction Attack on QC-MDPC
Q Guo, T Johansson, PS Wagner
IEEE Transactions on Information Theory 65 (3), 1845-1861, 2018
162018
Improved Distinguishers for HC-128
P Stankovski, S Ruj, M Hell, T Johansson
Designs, Codes and Cryptography 63 (2), 225-240, 2012
162012
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Q Guo, T Johansson, E Mårtensson, PS Wagner
IEEE Transactions on Information Theory 65 (8), 5243-5259, 2019
132019
Making the BKW Algorithm Practical for LWE
A Budroni, Q Guo, T Johansson, E Mårtensson, PS Wagner
International Conference on Cryptology in India, 417-439, 2020
92020
Improved Greedy Nonrandomness Detectors for Stream Ciphers.
L Karlsson, M Hell, P Stankovski
ICISSP 2017, 225-232, 2017
82017
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
P Stankovski, M Hell, T Johansson
Journal of cryptology 27 (1), 1-22, 2014
82014
A Generalized Birthday Approach for Efficiently Finding Linear Relations in -sequences
H Wang, P Stankovski, T Johansson
Designs, Codes and Cryptography 74 (1), 41-57, 2015
72015
Information Set Decoding with Soft Information and Some Cryptographic Applications
Q Guo, T Johansson, E Mårtensson, P Stankovski
2017 IEEE International Symposium on Information Theory (ISIT), 1793-1797, 2017
62017
eavesROP: Listening for ROP Payloads in Data Streams
C Jämthagen, L Karlsson, P Stankovski, M Hell
International Conference on Information Security, 413-424, 2014
62014
On the Sample Complexity of Solving LWE using BKW-Style Algorithms
Q Guo, E Mårtensson, PS Wagner
2021 IEEE International Symposium on Information Theory (ISIT), 2405-2410, 2021
42021
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
Q Guo, T Johansson, E Mårtensson, PS Wagner
Advances in Mathematics of Communications 13 (4), 559, 2019
42019
Not so greedy: Enhanced Subset Exploration for Nonrandomness Detectors
L Karlsson, M Hell, P Stankovski
International Conference on Information Systems Security and Privacy, 273-294, 2017
42017
Guarding the Guards: Accountable Authorities in VANETs
J Brorsson, PS Wagner, M Hell
2018 IEEE Vehicular Networking Conference (VNC), 1-4, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20