Martin Hell
Martin Hell
Associate Professor, Lund University
Verified email at
Cited by
Cited by
Grain: a stream cipher for constrained environments
M Hell, T Johansson, W Meier
International Journal of Wireless and Mobile Computing 2 (1), 86-93, 2007
A stream cipher proposal: Grain-128
M Hell, T Johansson, A Maximov, W Meier
Information Theory, 2006 IEEE International Symposium on, 1614-1618, 2006
The Grain family of stream ciphers
M Hell, T Johansson, A Maximov, W Meier
New stream cipher designs: The eSTREAM finalists, 179-190, 2008
Grain-128a: a new version of Grain-128 with optional authentication
M Ågren, M Hell, T Johansson, W Meier
International Journal of Wireless and Mobile Computing 5 (1), 48-59, 2011
Espresso: A stream cipher for 5G wireless communication systems
E Dubrova, M Hell
Cryptography and Communications 9, 273-289, 2017
Plateaued rotation symmetric Boolean functions on odd number of variables
A Maximov¹, M Hell, S Maitra
BFCA'05: Boolean Functions: Cryptography and Applications 387, 83, 2005
Breaking the F-FCSR-H Stream Cipher in Real Time.
M Hell, T Johansson
Asiacrypt 5350, 557-569, 2008
Towards a general RC4-like keystream generator
G Gong, KC Gupta, M Hell, Y Nawaz
Information Security and Cryptology: First SKLOIS Conference, CISC 2005 …, 2005
An overview of distinguishing attacks on stream ciphers
M Hell, T Johansson, L Brynielsson
Cryptography and Communications 1, 71-94, 2009
On efficient implementation of search strategy for rotation symmetric Boolean functions
M Hell, E Maximov, S Maitra
In Ninth International Workshop on Algebraic and Combinatoral Coding Theory …, 2004
" Grain-A Stream Cipher for Consistrained Environments," eSTREAM
M Hell
http://www. ecrypt. eu. org/stream/p3ciphers/grain_p3. pdf, 2005
A new version of Grain-128 with authentication
M Ågren, M Hell, T Johansson, W Meier
Workshop record of SKEW, 2011
Grain-128AEADv2-A lightweight AEAD stream cipher
M Hell, T Johansson, A Maximov, W Meier, J Sönnerup, H Yoshida
The NIST Lightweight Cryptography Standardization Process, 2019
A note on distinguishing attacks
H Englund, M Hell, T Johansson
2007 IEEE Information Theory Workshop on Information Theory for Wireless …, 2007
Two new attacks on the self-shrinking generator
M Hell, T Johansson
IEEE Transactions on Information Theory 52 (8), 3837-3843, 2006
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
M Hell, T Johansson
Journal of cryptology 24 (3), 427-445, 2011
Blockchain-based publishing layer for the Keyless Signing Infrastructure
C Jämthagen, M Hell
2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016
Visual cryptography and obfuscation: A use-case for decrypting and deobfuscating information using augmented reality
P Lantz, B Johansson, M Hell, B Smeets
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
A new instruction overlapping technique for anti-disassembly and obfuscation of x86 binaries
C Jämthagen, P Lantz, M Hell
2013 Workshop on Anti-malware Testing Research, 1-9, 2013
On hardware-oriented message authentication with applications towards RFID
M Ågren, M Hell, T Johansson
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20