


default search action
Martin Hell
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c45]Emil Wåreus, Anton Duppils, Magnus Tullberg, Martin Hell:
Security Issue Classification for Vulnerability Management with Semi-supervised Learning. ICISSP 2022: 84-95 - 2021
- [c44]Martin Hell, Thomas Johansson
, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. CANS 2021: 24-41 - [c43]Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh
, Martin Hell:
On-demand Key Distribution for Cloud Networks. ICIN 2021: 80-82 - [c42]Martin Hell, Martin Höst
:
Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study. PROFES 2021: 215-230 - [c41]Rasmus Hagberg, Martin Hell, Christoph Reichenbach
:
Using Program Analysis to Identify the Use of Vulnerable Functions. SECRYPT 2021: 523-530 - [c40]Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh, Martin Hell:
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks. SecureComm (2) 2021: 207-228 - [i5]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. IACR Cryptol. ePrint Arch. 2021: 751 (2021) - 2020
- [c39]Emil Wåreus, Martin Hell:
Automated CPE Labeling of CVE Summaries with Machine Learning. DIMVA 2020: 3-22 - [c38]Martin Höst
, Martin Hell:
Evaluation of the HAVOSS software process maturity model. SEAA 2020: 137-140 - [c37]Pegah Nikbakht Bideh
, Jonathan Sönnerup, Martin Hell:
Energy consumption for securing lightweight IoT protocols. IOT 2020: 16:1-16:8 - [c36]Joakim Brorsson, Pegah Nikbakht Bideh
, Alexander Nilsson
, Martin Hell:
On the Suitability of Using SGX for Secure Key Storage in the Cloud. TrustBus 2020: 32-47 - [i4]Alexander Maximov, Martin Hell:
Software Evaluation of Grain-128AEAD for Embedded Platforms. IACR Cryptol. ePrint Arch. 2020: 659 (2020)
2010 – 2019
- 2019
- [c35]Martin Hell, Thomas Johansson
, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida:
An AEAD Variant of the Grain Stream Cipher. C2SI 2019: 55-71 - [c34]Linus Karlsson, Pegah Nikbakht Bideh, Martin Hell:
A Recommender System for User-Specific Vulnerability Scoring. CRiSIS 2019: 355-364 - [c33]Thomas Olsson, Martin Hell, Martin Höst
, Ulrik Franke, Markus Borg:
Sharing of Vulnerability Information Among Companies - A Survey of Swedish Companies. SEAA 2019: 284-291 - [c32]Jonathan Sönnerup, Martin Hell, Mattias Sönnerup, Ripudaman Khattar:
Efficient Hardware Implementations of Grain-128AEAD. INDOCRYPT 2019: 495-513 - [i3]Thomas Olsson, Martin Hell, Martin Höst, Ulrik Franke, Markus Borg:
Sharing of vulnerability information among companies - a survey of Swedish companies. CoRR abs/1906.04424 (2019) - 2018
- [c31]Alexander Cobleigh, Martin Hell, Linus Karlsson, Oscar Reimer, Jonathan Sönnerup, Daniel Wisenhoff:
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code. EDOC Workshops 2018: 208-211 - [c30]Pegah Nikbakht Bideh
, Martin Höst
, Martin Hell:
HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components. PROFES 2018: 81-97 - [c29]Joakim Brorsson, Paul Stankovski Wagner, Martin Hell:
Guarding the Guards: Accountable Authorities in VANETs. VNC 2018: 1-4 - 2017
- [j14]Elena Dubrova, Martin Hell
:
Espresso: A stream cipher for 5G wireless communication systems. Cryptogr. Commun. 9(2): 273-289 (2017) - [c28]Linus Karlsson, Martin Hell, Paul Stankovski:
Improved Greedy Nonrandomness Detectors for Stream Ciphers. ICISSP 2017: 225-232 - [c27]Linus Karlsson, Martin Hell
, Paul Stankovski:
Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors. ICISSP (Revised Selected Papers) 2017: 273-294 - 2016
- [c26]Christopher Jämthagen, Patrik Lantz
, Martin Hell
:
Exploiting Trust in Deterministic Builds. SAFECOMP 2016: 238-249 - [c25]Linus Karlsson, Martin Hell
:
Enabling Key Migration Between Non-compatible TPM Versions. TRUST 2016: 101-118 - [c24]Christopher Jämthagen, Martin Hell
:
Blockchain-Based Publishing Layer for the Keyless Signing Infrastructure. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 374-381 - 2015
- [c23]Patrik Lantz
, Björn Johansson, Martin Hell
, Ben J. M. Smeets:
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality. Financial Cryptography Workshops 2015: 261-273 - [i2]Elena Dubrova, Martin Hell:
Espresso: A Stream Cipher for 5G Wireless Communication Systems. IACR Cryptol. ePrint Arch. 2015: 241 (2015) - 2014
- [j13]Paul Stankovski
, Martin Hell
, Thomas Johansson
:
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers. J. Cryptol. 27(1): 1-22 (2014) - [c22]Martin Hell
, Linus Karlsson, Ben J. M. Smeets, Jelena Mirosavljevic:
Using TPM Secure Storage in Trusted High Availability Systems. INTRUST 2014: 243-258 - [c21]Paul Stankovski
, Lennart Brynielsson, Martin Hell
:
The efficiency of optimal sampling in the random S-box model. ISIT 2014: 1712-1716 - [c20]Christopher Jämthagen, Linus Karlsson, Paul Stankovski, Martin Hell:
eavesROP: Listening for ROP Payloads in Data Streams. ISC 2014: 413-424 - 2013
- [j12]Hui Wang, Martin Hell
, Thomas Johansson
, Martin Ågren:
Improved Key Recovery Attack on the BEAN Stream Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1437-1444 (2013) - 2012
- [j11]Martin Ågren, Carl Löndahl, Martin Hell
, Thomas Johansson
:
A survey on fast correlation attacks. Cryptogr. Commun. 4(3-4): 173-202 (2012) - [j10]Paul Stankovski
, Sushmita Ruj
, Martin Hell
, Thomas Johansson
:
Improved distinguishers for HC-128. Des. Codes Cryptogr. 63(2): 225-240 (2012) - [j9]Martin Ågren, Martin Hell
, Thomas Johansson:
On hardware-oriented message authentication. IET Inf. Secur. 6(4): 329-336 (2012) - [j8]Martin Hell
, Thomas Johansson
, Lennart Brynielsson, Håkan Englund:
Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials. IEEE Trans. Inf. Theory 58(9): 6183-6193 (2012) - [c19]Paul Stankovski
, Martin Hell
, Thomas Johansson:
Analysis of Xorrotation with Application to an HC-128 Variant. ACISP 2012: 419-425 - [c18]Paul Stankovski
, Martin Hell
:
An optimal sampling technique for distinguishing random S-boxes. ISIT 2012: 846-850 - [c17]Martin Ågren, Martin Hell
, Thomas Johansson
, Carl Löndahl:
Improved message passing techniques in fast correlation attacks on stream ciphers. ISTC 2012: 260-264 - 2011
- [j7]Daniel Johnsson, Fredrik Bjärkeson, Martin Hell
, Florian Hug:
Searching for New Convolutional Codes using the Cell Broadband Engine Architecture. IEEE Commun. Lett. 15(5): 560-562 (2011) - [j6]Martin Ågren, Martin Hell
, Thomas Johansson
, Willi Meier:
Grain-128a: a new version of Grain-128 with optional authentication. Int. J. Wirel. Mob. Comput. 5(1): 48-59 (2011) - [j5]Martin Hell
, Thomas Johansson
:
Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time. J. Cryptol. 24(3): 427-445 (2011) - [c16]Christopher Jämthagen, Martin Hell
, Ben J. M. Smeets:
A Technique for Remote Detection of Certain Virtual Machine Monitors. INTRUST 2011: 129-137 - [c15]Martin Ågren, Martin Hell
:
Cryptanalysis of the stream cipher BEAN. SIN 2011: 21-28 - 2010
- [c14]Martin Hell
:
Using coding techniques to analyze weak feedback polynomials. ISIT 2010: 2523-2527
2000 – 2009
- 2009
- [j4]Martin Hell
, Thomas Johansson
, Lennart Brynielsson:
An overview of distinguishing attacks on stream ciphers. Cryptogr. Commun. 1(1): 71-94 (2009) - [c13]Martin Ågren, Thomas Johansson
, Martin Hell
:
Improving the Rainbow Attack by Reusing Colours. CANS 2009: 362-378 - [c12]Paul Stankovski
, Martin Hell
, Thomas Johansson
:
An Efficient State Recovery Attack on X-FCSR-256. FSE 2009: 23-37 - [c11]Martin Hell
, Lennart Brynielsson:
Another look at weak feedback polynomials in the nonlinear combiner. ISIT 2009: 1115-1119 - 2008
- [c10]Martin Hell
, Thomas Johansson:
Breaking the F-FCSR-H Stream Cipher in Real Time. ASIACRYPT 2008: 557-569 - [p1]Martin Hell
, Thomas Johansson, Alexander Maximov, Willi Meier:
The Grain Family of Stream Ciphers. The eSTREAM Finalists 2008: 179-190 - 2007
- [b1]Martin Hell:
On the Design and Analysis of Stream Ciphers. Lund University, Sweden, 2007 - [j3]Martin Hell
, Thomas Johansson
:
Cryptanalysis of Achterbahn-128/80. IET Inf. Secur. 1(2): 47-52 (2007) - [j2]Martin Hell
, Thomas Johansson
, Willi Meier:
Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2(1): 86-93 (2007) - [c9]Martin Hell, Thomas Johansson
:
A Key Recovery Attack on Edon80. ASIACRYPT 2007: 568-581 - [c8]Håkan Englund, Martin Hell, Thomas Johansson
:
Two General Attacks on Pomaranch-Like Keystream Generators. FSE 2007: 274-289 - [c7]Håkan Englund, Martin Hell
, Thomas Johansson
:
A Note on Distinguishing Attacks. ITW 2007: 1-4 - 2006
- [j1]Martin Hell
, Thomas Johansson
:
Two New Attacks on the Self-Shrinking Generator. IEEE Trans. Inf. Theory 52(8): 3837-3843 (2006) - [c6]Martin Hell
, Thomas Johansson
, Alexander Maximov, Willi Meier:
A Stream Cipher Proposal: Grain-128. ISIT 2006: 1614-1618 - [c5]Martin Hell, Thomas Johansson
:
Cryptanalysis of Achterbahn-Version 2. Selected Areas in Cryptography 2006: 45-55 - [c4]Martin Hell, Thomas Johansson:
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2. Selected Areas in Cryptography 2006: 220-233 - 2005
- [c3]Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz:
Towards a General RC4-Like Keystream Generator. CISC 2005: 162-174 - [c2]Martin Hell, Thomas Johansson
:
Some Attacks on the Bit-Search Generator. FSE 2005: 215-227 - 2004
- [c1]Håkan Englund, Martin Hell, Thomas Johansson
:
Correlation Attacks Using a New Class of Weak Feedback Polynomials. FSE 2004: 127-142 - [i1]Alexander Maximov, Martin Hell, Subhamoy Maitra:
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables. IACR Cryptol. ePrint Arch. 2004: 144 (2004)
Coauthor Index
aka: Paul Stankovski

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint