List of Publications


Publications are listed per team, per type and per year. The numbering for year one follows the notation: [C?] conference, [J?] journal, [SC?] short conference; all peer reviewed. For year 2, the identifiers are [Y2C?], [Y2J?], and [Y2SC?], respectively. For year 3, [Y3C?], [Y3J?], and [Y3SC?] respectively. The number is consistent the yearly reporting to the funding agency.




KAU: Karlstad University


Year 5

[Y5J1] L. Islami, S. Fischer-Hübner, and P. Papadimitratos, “Capturing drivers’ privacy preferences for intelligent transportation systems: An intercultural perspective,” Computers & Security, vol. 123, pp. 102913, 2022.

[Y5J2] L. Horn Iwaya, M. Ali Babar, C. Wijayarathna. “On the privacy of mental health apps: An empirical investigation and its implications for app development”. Empirical Software Engineering (2023) 28:2.

[Y5C1] M. Akil, L. Martucci, J-H Hoepman, “Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs”, Symposium on Vehicle Security and Privacy (VehicleSec) 2023. NDSS workshop, 27 Feb 2023.

[Y5C2] R. Dahlberg, Syverson, P., Nordberg, L., & Finkel, M. (2022, November). “Sauteed Onions: Transparent Associations from Domain Names to Onion Addresses”. In 21st Workshop on Privacy in the Electronic Society – WPES 2022 (pp. 35-40).

[Y5C3] R. Dahlberg and T. Pulls. “Timeless Timing Attacks and Preload Defenses in Tor’s DNS Cache”. USENIX Security 2023.

[Y5Lic1] L. Islami. Towards Usable Privacy and Identity Management for Smart Environments. (Licentiate dissertation). Karlstads universitet. December 2022.

Year 4

[Y4C1] M. Hansen and M. Jensen. “A Generic Data Model for Implementing Right of Access Requests.” Proceedings of the 10th Annual Privacy Forum (APF 2022), 23-24 June 2022, Springer.

Year 3

[Y3C11] R. Dahlberg, P. Pulls, T. Ritter & P. Syverson. Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor. Proceedings on Privacy Enhancing Technologies (PoPETS), 2021(2), 194-213.

[Y3C12] L. Islami, S. Fischer-Hübner, E. Naa Korkoi Hammond and J. Eloff. Analysing drivers’ preferences for privacy enhancing car-to-car communication systems, Post-Proceedings of the IFIP Summer School 2020 as part of IFIP SEC 2021, Maribor, 21-23 September 2020. Springer (in print – to appear in summer 2021).

[Y3J11] M. Akil, L. Islami, S. Fischer-Hübner, M. Martucci, A. Zuccato. Privacy-Preserving Identifiers for IoT: A Systematic Literature Review. IEEE Access, 8, 168470-168485. (2020).

Year 2

[Y2J1] F. Karegar, J.S. Pettersson, and S. Fischer-Hübner, “The dilemma of user engagement in privacy notices: Effects of interaction modes and habituation on user attention,” ACM Transactions on Privacy and Security (TOPS) 23.1 (2020): 1-38.

[Y2J2] A. Kitkowska, Y. Shulman, L.A. Martucci, E. Wästlund. “Psychological Effects and Their Role in Online Privacy Interactions: A Review“. IEEE Access, 2020. Vol. 8. pp 21236-21260.

[Y2C1] P. Murmann, S. Fischer-Hübner, D. Reinhard, “Reconciling the What, When and How of Privacy Notifications in mHealth”. Under submission.

Year 1

[C5] P. Murmann, D. Reinhardt, and S. Fischer-Hübner, “To Be, or Not to Be Notified—Eliciting Privacy Notification Preferences for Online mHealth Services”, In Proceedings of the 34th ICT Systems Security and Privacy Protection- IFIP SEC 2019

[J3] L. Horn Iwaya, S. Fischer-Hübner, R.-M. Åhlfeldt, and L. Martucci, “Mobile Health Systems for Community-Based Primary Care: Identifying Controls and Mitigating Privacy Threats”, Journal of Medical Internet Rsearch (JMIR) mHhealth and uHealth, 2019



KTH: Division of Information Science and Engineering (ISE)


Year 5

[Y5J3] A. Zamani, T. Oechtering and M. Skoglund, “On the privacy-utility trade-off with and without direct access to the private data,” IEEE Transactions on Information Theory. Submitted December 2022.

[Y5C4] A. Zamani, T. Oechtering and M. Skoglund, “Bounds for privacy-utility trade-off with non-zero leakage,” in Proc. IEEE ISIT 2022.

[Y5C5] A. Zamani, T. Oechtering and M. Skoglund, “Bounds for privacy-utility trade-off with per-letter privacy constraints and non-zero leakage,” in Proc. IEEE ITW 2022.

[Y5C6] A. Zamani, T. Oechtering and M. Skoglund, “Multi-user privacy mechanism design with non-zero leakage,” in Proc. IEEE ITW 2023.

[Y5PhD1] H. Ghourchian, “On Secure and Sequential Source Coding,” PhD thesis, KTH, March 2023

[Y5PhD2] M. Mylonakis, “Empirical Coordination over Networks Subject to Fidelity Criteria,” PhD thesis, KTH, March 2023

Year 4

[Y4J1] A. Zamani, T. Oechtering and M. Skoglund, “Data disclosure with non-zero leakage and non-invertible leakage matrix,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 165-179, 2022.

[Y4C2] H. Ghourchian, P. Stavrou, T. Oechtering and M. Skoglund, “Secure source coding with side-information at decoder and shared key at encoder and decoder,” in Proc. IEEE ITW 2021.

[Y4C3] M. Mylonakis, P. Stavrou and M. Skoglund, “Adaptive interference coordination over channels with unknown state at the encoder and the decoder,” in Proc. IEEE ITW 2021.

[Y4C4] M. Skoglund, “Secure block source coding with sequential encoding,” London Symposium on Information Theory (invited talk), May 2021.

[Y4C5] B. Cavarec, P. A. Stavrou, M. Skoglund and M. Bengtsson, “Designing privacy filters for hidden Markov processes,” in Proc. ECC 2021.

Year 3

[Y3J1] H. Ghourchian, P. Stavrou, T. Oechtering and M. Skoglund, "Secure block source coding with sequential encoding," IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 32-48, March 2021.

[Y3J2] G. Cervia, T. Oechtering and M. Skoglund,"Fixed-length strong coordination capacity," IEEE Transactions on Information Theory. Submitted January 2021.

[Y3J3] A. Zamani, T. Oechtering and M. Skoglund, "A design framework for strongly Chi-square-private data disclosure," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2312-2325, 2021.

[Y3C1] M. Mylonakis, P. Stavrou and M. Skoglund, "Remote empirical coordination," in Proc. ISITA 2020.

[Y3C2] G. Cervia, T. Oechtering and M. Skoglund, "Remote joint strong coordination and reliable communication," in Proc. IEEE ISIT 2020.

[Y3C3] G. Cervia, G. Bassi and M. Skoglund, "Secure strong coordination," in Proc. IEEE WPS 2020.

[Y3C4] A. Zamani, T. Oechtering and M. Skoglund, "Data disclosure mechanism design with non-zero leakage," in Proc. IEEE ITW 2020.

Year 2

[Y2J3] Q. Wang and M. Skoglund, "Symmetric private information retrieval from MDS coded distributed storage with non-colluding and colluding servers," IEEE Transactions on Information Theory, vol. 65, no. 8, pp. 5160-5175, August 2019.

[Y2J4] Q. Wang and M. Skoglund, "On PIR and symmetric PIR from colluding databases with adversaries and eavesdroppers," IEEE Transactions on Information Theory, vol. 65, no. 5, pp. 3183-3197, May 2019.

[Y2J5] Q. Wang, H. Sun and M. Skoglund, "The capacity of private information retrieval with eavesdroppers," IEEE Transactions on Information Theory, vol. 65, no. 5, pp. 3198-3214, May 2019.

[Y2C2] Q. Wang, H. Sun and M. skoglund, "Symmetric private information retrieval with mismatched coded messages and randomness," in Proc. IEEE ISIT 2019.

[Y2C3] G. Bassi and M. Skoglund, "On the mutual information of two Boolean functions, with application to privacy," in Proc. IEEE ISIT 2019.

[Y2C4] M. Mylonakis, P. Stavrou and M. Skoglund, "Empirical coordination with multiple descriptions," in Proc. IEEE Allerton 2019.

[Y2C5] M. Mylonakis, P. Stavrou and M. Skoglund, "Empirical coordination subject to a fidelity criterion," in Proc. IEEE ITW 2019.

[Y2C6] G. Cervia, T. Oechtering and M. Skoglund, "Fixed-length strong coordination," in Proc. IEEE ITW 2019.

Year 1

[C2] Q. Wang, H. Sun and M. Skoglund, "The ε-error capacity of symmetric PIR with Byzantine adversaries," in Proc. IEEE ITW 2018.

[C3] Q. Wang, H. Sun and M. Skoglund, "The capacity of private information retrieval with eavesdroppers," in Proc. IEEE Asilomar 2018.

[C4] G. Bassi, P. Piantanida and M. Skoglund, "Lossy communication subject to statistical parameter privacy," in Proc. IEEE ISIT 2018.



KTH: Networked Systems Security Group (NSS)


Year 5

[Y5J1] L. Islami, S. Fischer-Hübner, and P. Papadimitratos, “Capturing drivers’ privacy preferences for intelligent transportation systems: An intercultural perspective,” Computers & Security, vol. 123, pp. 102913, 2022. (* joint work, reported by KAU too)

[Y5J4] K. Zhang, E. Larsson, and P. Papadimitratos, “Protecting GNSS Open Service Navigation Message Authentication Against Distance-Decreasing Attacks,” IEEE Transactions on Aerospace and Electronic Systems (IEEE TAES), vol. 58, no. 2, pp. 1224-1240, 2022.

[Y5C7] K. Kalogiannis, M. Khodaei, W. Bayaa, and P. Papadimitratos, “Attack Impact and Misbehavior Detection in Vehicular Platoons,” ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), San Antonio, TX, USA, pp. 45–59, May 2022

[Y5C8] C. Eryonucu, and P. Papadimitratos, “Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life,” ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), San Antonio, TX, USA, pp. 73–84, May 2022

Year 4

[Y4C6] H. Jin and P. Papadimitratos, “Off-the-shelf Wi-Fi Indoor Smartphone Localization,” IEEE Wireless On-demand Network systems and Services Conference (IEEE WONS), March 2022

[Y4C7] M. Spanghero and P. Papadimitratos, “High-precision Hardware Oscillators Ensemble for GNSS Attack Detection,” in Proceedings of the IEEE Aerospace Conference, Big Sky, Montana, USA, March 2022

[Y4J2] T. Barbette, E. Wu, D. Kostić, G. Q. Maguire, P. Papadimitratos and M. Chiesa, “Cheetah: A High-Speed Programmable Load-Balancer Framework With Guaranteed Per-Connection-Consistency,” in IEEE/ACM Transactions on Networking, vol. 30, no. 1, pp. 354-367, February 2022

[Y4C8] M. Lenhart, M. Spanghero, and P. Papadimitratos, “Distributed and Mobile Message-Level Relaying/Replaying of GNSS Signals” In Proceedings of the ION International Technical Meeting, Long Beach, CA, USA, January 2022

[Y4J3] I. Symeonidis, D. Rotaru, M. A. Mustafa, B. Mennink, B. Preneel and P. Papadimitratos, “HERMES: Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access System,” in IEEE Internet of Things Journal, vol. 9, no. 1, pp. 129-151, 1 January 2022

[Y4J6] Z. Gülgün, E. G. Larsson and P. Papadimitratos, “Multiple Spoofer Detection for Mobile GNSS Receivers Using Statistical Tests,” in IEEE Access, vol. 9, pp. 166382-166394, December 2021

[Y4C9] P. Molloy, M. Khodaei, P. Hallgren, A. Thenorio, and P. Papadimitratos, “SecProtobuf: Implicit Message Integrity Provision in Heterogeneous Vehicular Systems,” in Proceedings of the IEEE Vehicular Networking Conference (VNC), November 2021

[Y4C10] R. Narayanan, A. Varshney and P. Papadimitratos, “HarvestPrint: Securing Battery-free Backscatter Tags through Fingerprinting,” in Proc. of the Twentieth ACM Workshop on Hot Topics in Networks, ACM HotNets, November 2021

[Y4C11] M. Soltani, M. Mirmohseni and P. Papadimitratos, “Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers,” IEEE International Conference on Computer Communications and Networks (IEEE ICCCN), July 2021

[Y4SC1] M. Spanghero and P. Papadimitratos, “Detecting GNSS misbehavior with high-precision clocks,” (Poster) In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), June 2021

[Y4SC2] M. Lenhart, M. Spanghero, and P. Papadimitratos, “Relay/replay attacks on GNSS signals,” (Demo) In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), June 2021

Year 3

[Y3SC1] P. Papadimitratos, “Mix-Zones in Wireless Mobile Networks,” Encyclopedia of Cryptography Security and Privacy, to appear. (contribution is a short chapter, in the absence of such category indexed SC)

[Y3J4] M. Khodaei and P. Papadimitratos, “Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems,” IEEE Transactions on Mobile Computing (IEEE TMC), March 2021.

[Y3J5] M. Khodaei and P. Papadimitratos, “Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones are not Enough,” IEEE Internet Of Things Journal (IEEE IoT), March 2021.

[Y3J6] K. Zhang, P. Papadimitratos, “Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers,” IEEE Open Journal of the Communications Society 2, 217-234, February 2021.

[Y3C5] P. Babaheidarian, S. Salimi, and P. Papadimitratos, “Scalable Security in Interference Channels with Arbitrary Number of Users,” in International Symposium on Information Theory and Its Applications (ISITA), Kapolei, Hawai’i, USA, October 2020.

[Y3C6] M. Spanghero, K. Zhang, P. Papadimitratos, “Authenticated Time for Detecting GNSS Attacks,” 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2020), Pages 3826-3834, September 2021.

[Y3C7] K. Zhang, M. Spanghero, and P. Papadimitratos, “Protecting GNSS-based Services using Time Offset Validation,” in 2020 IEEE/ION Position, Location and Navigation Symposium (PLANS), Portland, Oregon, April 2020, pp. 575--583.

[Y3C8] T. Barbette, C. Tang, H. Yao, D. Kostic, G. Q. Maguire, P. Papadimitratos, and M. Chiesa, “A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency,” in 17th USENIX Symposium on Networked Systems Design and Implementation, (NSDI), Santa Clara, CA, USA, February 2020, pp. 667--683. (paper not reported in last period).

Year 2

[Y2J6] M. Khodaei and P. Papadimitratos, “Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems,” IEEE Transactions on Mobile Computing (IEEE TMC), accepted for publication, March 2020.

[Y2J7] H. Jin and P. Papadimitratos, “Resilient Privacy Protection for Location-based Services through Decentralization,” ACM Transactions on Privacy and Security (ACM TOPS), 22(4), 21:1-36, 2019 (note: J4 in Y1 report, mentioned as accepted for publication)

[Y2J8] H. Jin and P. Papadimitratos, “DoS-resilient cooperative beacon verification for vehicular communication systems,” Elsevier Ad Hoc Networks, 90, 101775, 2019 (note: J4 in Y1 report, mentioned as accepted for publication)

[Y2C7] M. Spanghero, K. Zhang, and P. Papadimitratos, “Authenticated time for detecting GNSS attacks,” International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2020), St. Louis, MI, USA, September 2020, abstract accepted

[Y2C8] K. Zhang, M. Spanghero, and P. Papadimitratos, “Protecting GNSS-based Services using Time Offset Validation,” IEEE/ION Position Location and Navigation Symposium, Reston, VA, USA, April 2020

[Y2C9] K. Zhang and P. Papadimitratos, “Safeguarding NMA Enhanced Galileo OS Signals from Distance-Decreasing Attacks,” Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019), Miami, Florida, USA, September 2019, pp. 4041-4052.

[Y2C10] M. Khodaei, H. Noroozi, and P. Papadimitratos, ‘‘Scaling Pseudonymous Authentication for Large Mobile Systems,’’ in Proceedings of the 12th ACM Conference on Security & Privacy in Wireless and Mobile Networks (ACM WiSec), Miami, FL, USA, May 2019.

[Y2C11] Z. Gülgün, E. G. Larsson, and P. Papadimitratos, “Statistical Method for Spoofing Detection at Mobile GNSS Receivers,” in Proceedings of the 16th International Symposium on Wireless Communication Systems (ISWCS), Oulu, Finland, August 2019.

[Y2SC1] H. Noroozi, M. Khodaei, and P. Papadimitratos, ‘‘VPKIaaS: Towards Scaling Pseudonymous Authentication for Large Mobile Systems,’’ demo in joint Cybersecurity and Privacy (CySeP) Summer School/IEEE EuroS&P session, Stockholm, Sweden, June 2019.

[Y2SC2] Z. Gulgun, E. G. Larsson and P. Papadimitratos, “Statistical Method for Spoofing Detection at Mobile GNSS Receivers,” poster in joint Cybersecurity and Privacy (CySeP) Summer School/IEEE EuroS&P session, Stockholm, Sweden, June 2019.

[Y2SC3] H. Jin and P. Papadimitratos, “Achieving Scalable and Resilient Cooperative Awareness in VANETs,” poster in joint Cybersecurity and Privacy (CySeP) Summer School/IEEE EuroS&P session, Stockholm, Sweden, June 2019.

[Y2SC4] P. Sánchez Carmona and P. Papadimitratos, “Secure and private pedestrian safety,” poster in joint Cybersecurity and Privacy (CySeP) Summer School/IEEE EuroS&P session, Stockholm, Sweden, June 2019.

[Y2SC5] M. Khodaei and P. Papadimitratos, “A Cooperative Location Privacy Protection for Vehicular Ad-hoc Networks,” poster in joint Cybersecurity and Privacy (CySeP) Summer School/IEEE EuroS&P session, Stockholm, Sweden, June 2019.

[Y2SC6] K. Zhang and P. Papadimitratos, “Is the upcoming Galileo Authenticated GNSS Signals safe enough?”, poster in joint Cybersecurity and Privacy (CySeP) Summer School/IEEE EuroS&P session, Stockholm, Sweden, June 2019.

Year 1

[J4] H. Jin and P. Papadimitratos, “Resilient Privacy Protection for Location-based Services through Decentralization,” ACM Transactions on Privacy and Security (ACM TOPS), accepted (8-3-19), to appear

[J5] H. Jin and P. Papadimitratos, “DoS-resilient cooperative beacon verification for vehicular communication systems,” Ad Hoc Networks, accepted for publication, available online, October 2018

[C6] K. Zhang and P. Papadimitratos, "Secure Multi-constellation GNSS Receivers with Clustering-based Solution Separation Algorithm," IEEE Aerospace Conference (IEEE AeroConf), Yellowstone, MO, USA, March 2019

[C7] K. Zhang and P. Papadimitratos, “On the Effects of Distance-decreasing Attacks on Cryptographically Protected GNSS Signals,” International Technical Meeting of The Institute of Navigation (ION ITM), Reston, VA, USA, January 2019

[C8] C. Vaas, M. Khodaei, P. Papadimitratos, and I. Martinovic, “Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles,” IEEE Vehicular Networking Conference (IEEE VNC), Taipei, Taiwan, December 2018

[C9] M. Khodaei and P Papadimitratos, “Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs,” ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), Stokcholm, Sweden, June 2018

[SC1] C Vaas, M Roeschlin, P Papadimitratos, I Martinovic, "Poster: Tracking Vehicles Through Encrypted Mix- Zones Using Physical Layer Properties," IEEE Vehicular Networking Conference (IEEE VNC), Taipei, Taiwan, December 2018

[SC2] M. Khodaei, P. Papadimitratos, "Poster: Mix-Zones Everywhere: A Dynamic Cooperative Location Privacy Protection Scheme," IEEE Vehicular Networking Conference (IEEE VNC), Taipei, Taiwan, December 2018

[SC3] H. Noroozi, M. Khodaei, and P. Papadimitratos, "Demo: VPKIaaS: A Highly-Available and Dynamically- Scalable Vehicular Public-Key Infrastructure," ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), Stockholm, Sweden, June 2018

[SC4] A. Hylamia, M. Spanghero, A. Varshney, T. Voigt, and P. Papadimitratos, "Demo: Security on Harvested Power," ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), Stockholm, Sweden, June 2018

[SC5] J. Borsub, P Papadimitratos, "Poster: Hardened Registration Process for Participatory Sensing," ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), Stockholm, Sweden, June 2018

[SC6] A. Hylamia, A. Varshney, A. Soleiman, P. Papadimitratos, C. Rohner, and T. Voigt, "Demo: Towards Battery-free Radio Tomographic Imaging," ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), Stockholm, Sweden, June 2018 (best demo award)



LiU: Linköping University


Year 5

[Y5J5] Z. Gülgün and E. G. Larsson, “Channel Estimation for Massive MIMO in the Presence of Cauchy Noise,” to be submitted in IEEE Transactions on Wireless Communications (Under Major Revision)

[Y5C9] Z. Gülgün and E. G. Larsson, “Channel Estimation in Massive MIMO with Heavy-tailed Noise: Gaussian-mixture versus Cauchy Models,” to appear in ICASSP 2023, Rhodes, Greece.

Year 4

[Y4J4] B. R. Manoj, M. Sadeghi and E. G. Larsson, “Downlink power allocation in massive MIMO via deep learning: Adversarial attacks and training,” IEEE Transactions on Cognitive Communications and Networking, 2022.

[Y4C12] Z. Gülgün and E. G. Larsson, “Channel Estimation for Massive MIMO in the Presence of Cauchy Noise,” in Proc. of IEEE ICC 2022, Seoul.

[Y4J5] P. M. Santos, B. R. Manoj, M. Sadeghi and E. G. Larsson, “Universal adversarial attacks on neural networks for power allocation in a massive MIMO system,” IEEE Wireless Communications Letters, vol. 11, pp. 67–71, Jan. 2022.

[Y4J6] Z. Gülgün, E. G. Larsson and P. Papadimitratos, “Multiple Spoofer Detection for Mobile GNSS Receivers Using Statistical Tests,” in IEEE Access, vol. 9, pp. 166382-166394, 2021.

[Y4C13] B. R. Manoj, M. Sadeghi and E. G. Larsson “Adversarial attacks on deep learning-based power allocation in a massive MIMO network,” in Proc. of IEEE International Conference on Communications (ICC), June 2021.

Year 3

[Y3C9] Z. Gülgün, E. Björnson and E. G. Larsson, "Performance Analysis of Massive MIMO With Distributed Jammers," ICC 2020 - 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 2020, pp. 1-6

[Y3J7] Z. Gülgün, E. Björnson and E. G. Larsson, "Is Massive MIMO Robust Against Distributed Jammers?," in IEEE Transactions on Communications, vol. 69, no. 1, pp. 457-469, Jan. 2021

Year 2

[Y2J9] A Kalantari, EG Larsson, “Statistical test for GNSS spoofing attack detection by using multiple receivers on a rigid body,” EURASIP Journal on Advances in Signal Processing 2020 (1), pp. 1-16

[Y2C11] Z. Gülgün, E. G. Larsson, and P. Papadimitratos, “Statistical Method for Spoofing Detection at Mobile GNSS Receivers,” in Proceedings of the 16th International Symposium on Wireless Communication Systems (ISWCS), Oulu, Finland, August 2019. (listed under KTH, NSS too)

[Y2J10] M Sadeghi, EG Larsson, “Physical adversarial attacks against end-to-end autoencoder communication systems,” IEEE Communications Letters 23 (5), 847-850, 2019

[Y2SC2] Z. Gulgun, E. G. Larsson and P. Papadimitratos, “Statistical Method for Spoofing Detection at Mobile GNSS Receivers,” poster in joint Cybersecurity and Privacy (CySeP) Summer School/IEEE EuroS&P session, Stockholm, Sweden, June 2019. (listed under KTH, NSS too)



LTH: Lund University


Year 5

[Y5J6] T. Johansson, W. Meier, and V. Nguyen, “Attacks on the Firekite cipher,” IACR Transactions on Symmetric Cryptology, 2022(3), 191–216.

[Y5J7] Q. Guo, C. Hlauschek, T. Johansson, N Lahr, A. Nilsson, and R.L. Schröder, “Don’t reject this: Key-recovery timing attacks due to rejection-sampling in HQC and BIKE”, IACR Transactions on Cryptographic Hardware and Embedded Systems, 223-263

Year 4

[Y4C14] Q Guo, T Johansson, Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part IV. Springer, p. 33-62 Chapter 2. (Lecture Notes in Computer Science; vol. 13093).

[Y4J7] Ngo, K., Dubrova, E., Guo, Q. & Johansson, T., A side-channel attack on a masked IND-CCA secure saber KEM implementation, 2021, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2021, 4, p. 676-707

[Y4C15] Nilsson, A., Bocharova, I., Kudryashov, B. & Johansson, T., A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems, 2021, 2021 IEEE International Symposium on Information Theory. 5 p.

[Y4J8] Yang, J., Johansson, T. & Maximov, A., Improved guess-and-determine and distinguishing attacks on snow-v, 2021 Sep, In: IACR Transactions on Symmetric Cryptology. 2021, 3, p. 54-83 30 p.

[Y4J9] Yang, J., Guo, Q., Johansson, T. & Lentmaier, M., Revisiting the Concrete Security of Goldreich’s Pseudorandom Generator, 2021, (E-pub ahead of print) In: IEEE Transactions on Information Theory.

[Y4C16] Ekdahl, P., Maximov, A., Johansson, T. & Yang, J., SNOW-Vi: An extreme performance variant of SNOW-V for lower grade CPUs, 2021 Jun 21, WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 261-272 12 p.

Year 3

[Y3J8] Yang, J., & Johansson, T. (2020). An overview of cryptographic primitives for possible use in 5G and beyond. Science China Information Sciences, 63(12), 1-22.

[Y3J9] Yang, J., Johansson, T., & Maximov, A. (2020). Spectral analysis of ZUC-256. IACR Transactions on Symmetric Cryptology, 266-288.

[Y3J10] Guo, Q., Johansson, T., & Löndahl, C. (2020). Solving LPN using covering codes. Journal of Cryptology, 33(1), 1-33.

[Y3C8] Budroni, A., Guo, Q., Johansson, T., Mårtensson, E., & Wagner, P. S. (2020, December). Making the BKW Algorithm Practical for LWE. In International Conference on Cryptology in India (pp. 417-439). Springer, Cham.

[Y3C9] Guo, Q., & Johansson, T. (2020, December). A New Decryption Failure Attack Against HQC. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 353-382). Springer, Cham.

[Y3C10] Guo, Q., Johansson, T., & Nilsson, A. (2020, August). A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM. In Annual International Cryptology Conference (pp. 359-386). Springer, Cham.

Year 2

[Y2J11] Q. Guo, T. Johansson, E. Mårtensson, P.S. Wagner, “Some cryptanalytic and coding-theoretic applications of a soft stern algorithm”, Advances in Mathematics of Communications 13 (4), 2019.

[Y2J12] P. Ekdahl, T. Johansson, A. Maximov, J. Yang, “A new SNOW stream cipher called SNOW-V”, IACR Transactions on Symmetric Cryptology, 1-42, September 2019.

[Y2J13] Q. Guo, T. Johansson, “A new birthday-type algorithm for attacking the fresh re-keying countermeasure,” Information Processing Letters 146, 30-34, June 2019

[Y2C12] M. Hell, T. Johansson, W. Meier, J. Sönnerup, H. Yoshida, “An AEAD variant of the grain stream cipher,” International Conference on Codes, Cryptology, and Information Security, 55-71

[Y2J14] Q. Guo, T. Johansson, E. Mårtensson, P.S. Wagner, “On the asymptotics of solving the lwe problem using coded-bkw with sieving,” IEEE Transactions on Information Theory 65 (8), 5243-5259, August 2019

[Y2J15] J. Yang, T. Johansson, A. Maximov, “Vectorized linear approximations for attacks on SNOW 3G”, IACR Transactions on Symmetric Cryptology, 2019, 249-271.

Year 1

[C1] J. C. Deneuville, P. Gaborit, Q. Guo, and T. Johansson, "Ouroboros-E: An Efficient Lattice-based Key- Exchange Protocol" IEEE International Symposium on Information Theory, (IEEE ISIT), Vail, CO, USA, June 2018.

[J1] Q. Guo, T. Johansson, E. Mårtensson, and P. Stankovski, "On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving," IEEE Transactions on Information Theory, 2018.