Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Patrik Ekdahl is active.

Publication


Featured researches published by Patrik Ekdahl.


selected areas in cryptography | 2002

A New Version of the Stream Cipher SNOW

Patrik Ekdahl; Thomas Johansson

In 2000, the stream cipher SNOW was proposed. A few attacks followed, indicating certain weaknesses in the design. In this paper we propose a new version of SNOW, called SNOW 2.0. The new version of the cipher does not only appear to be more secure, but its implementation is also a bit faster in software.


fast software encryption | 2002

Distinguishing Attacks on SOBER-t16 and t32

Patrik Ekdahl; Thomas Johansson

Two ways of mounting distinguishing attacks on two similar stream ciphers, SOBER-t16 and SOBER-t32, are proposed. It results in distinguishing attacks faster than exhaustive key search on full SOBER- t16 and on SOBER-t32 without stuttering.


international symposium on information theory | 2001

Another attack on A5/1

Patrik Ekdahl; Thomas Johansson

A5/1 is a stream cipher used in the GSM system. Several time-memory trade-off attacks against A5/1 have been proposed previously. This paper presents a completely different attack, based on ideas from correlation attacks.


international symposium on information theory | 2003

A note on the selfshrinking generator

Patrik Ekdahl; Thomas Johansson; Willi Meier

This paper shows that certain weak feedback polynomials allow very efficient distinguishing attacks on the selfshrinking generator. This gives a new improved attack if the generator uses a secret feedback polynomial.


international symposium on information theory | 2001

Another attack on A5/1 [GSM stream cipher]

Patrik Ekdahl; Thomas Johansson

A5/1 is a stream cipher used in the GSM system. Several time-memory trade-off attacks against A5/1 have been proposed previously. This paper presents a completely different attack, based on ideas from correlation attacks.


international conference on information and communication security | 1999

Incremental Authentication of Tree-Structured Documents

Patrik Ekdahl; Ben Smeets

A new message authentication code (MAC) is described that exploits the tree structure present in many modern document formats, e.g. SGML and XML. The new code supports incremental updating of the cryptographic checksum in the process of making incremental changes to the document. Theoretical bounds on the probability of a successful substitution attack are derived. Through experimental results we demonstrate that for randomly chosen messages the success probability of such an attack will be smaller and is easily identified.


First open Nessie Workshop | 2000

SNOW - A new stream cipher

Patrik Ekdahl; Thomas Johansson


Lecture Notes in Computer Science | 2003

Predicting the shrinking generator with fixed connections

Patrik Ekdahl; Willi Meier; Thomas Johansson


10th Joint Conference on Communications and Coding | 2000

Some results on correlations in the Bluetooth stream cipher

Patrik Ekdahl; Thomas Johansson


Archive | 2000

Some results on correlations in the bluetooth stream generator

Patrik Ekdahl; Thomas Johansson

Collaboration


Dive into the Patrik Ekdahl's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge