Anomaly detection forest J Sternby, E Thormarker, M Liljenstam ECAI 2020, 1507-1514, 2020 | 14 | 2020 |
Post-quantum cryptography: supersingular isogeny Diffie-Hellman key exchange E Thormarker Master's thesis, Stockholm University, 2017 | 14 | 2017 |
Quantum-Resistant Cryptography JP Mattsson, B Smeets, E Thormarker arXiv preprint arXiv:2112.00399, 2021 | 13 | 2021 |
Quantum technology and its impact on security in mobile networks JP Mattsson, B Smeets, E Thormarker Ericsson Technology Review 2021 (12), 2-12, 2021 | 7 | 2021 |
Computer-implemented method and arrangement for classifying anomalies J Sternby, M Liljenstam, E Thormarker US Patent 11,582,249, 2023 | 4 | 2023 |
Method and arrangement for detecting anomalies in network data traffic J Sternby, V Giannokostas, M Liljenstam, E Thormarker US Patent 11,444,964, 2022 | 4 | 2022 |
Proposals for Standardization of Encryption Schemes JP Mattsson, B Smeets, E Thormarker Third NIST Workshop on Block Cipher Modes of Operation, 2, 2023 | 2 | 2023 |
Subscription concealed identifier privacy J Mattsson, PK Nakarmi, E Thormarker US Patent App. 17/771,539, 2022 | 1 | 2022 |
On using the same key pair for Ed25519 and an X25519 based KEM E Thormarker IACR Cryptol. ePrint Arch., 2021 | 1 | 2021 |
Computer-implemented method and arrangement for classifying anomalies J Sternby, M Liljenstam, E Thormarker US Patent 11,838,308, 2023 | | 2023 |
Constrained Radio Networks, Small Ciphertexts, Signatures, and Non-Interactive Key Exchange JP Mattsson, G Selander, B Smeets, E Thormarker | | |