scispace - formally typeset
F

Fredrik U. Jönsson

Researcher at Stockholm University

Publications -  74
Citations -  2373

Fredrik U. Jönsson is an academic researcher from Stockholm University. The author has contributed to research in topics: Correlation attack & Recall. The author has an hindex of 26, co-authored 70 publications receiving 2176 citations. Previous affiliations of Fredrik U. Jönsson include Uppsala University & Allen Institute for Brain Science.

Papers
More filters
Journal ArticleDOI

Aesthetics and preferences of web pages

TL;DR: The first impressions of web pages presented to users was investigated by using 13 different web pages, three types of scales and 18 participants, finding four important dimensions: beauty, mostly illustrations versus mostly text, overview and structure.
Book ChapterDOI

Improved fast correlation attacks on stream ciphers via convolutional codes

TL;DR: New methods for fast correlation attacks, based on the theory of convolutional codes, are described, which can be applied to arbitrary LFSR feedback polynomials, in opposite to the previous methods, which mainly focus on feedback poynomials of low weight.
Book ChapterDOI

Fast Correlation Attacks through Reconstruction of Linear Polynomials

TL;DR: In this paper, a fast correlation attack is proposed to restore the initial content of a linear feedback shift register in a stream cipher using a detected correlation with the output sequence, by modeling this problem as the problem of learning a binary linear multivariate polynomial.
Journal Article

Fast correlation attacks through reconstruction of linear polynomials

TL;DR: By modeling the task of a fast correlation attack as the problem of learning a binary linear multivariate polynomial, algorithms forPolynomial reconstruction with queries can be modified through some general techniques used in fast correlation attacks.
Book ChapterDOI

Fast Correlation Attacks Based on Turbo Code Techniques

TL;DR: In this article, the authors describe new methods for fast correlation attacks on stream ciphers, based on techniques used for constructing and decoding the by now famous turbo codes, consisting of two parts, a preprocessing part and a decoding part.