Browsing by Author Mihaljević, Miodrag J.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 181  next >
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, HidekiA Fast Cryptographic Hash Function Based on Cellular Automata over GF(q)1998Global IT Security, IFIP (14th IFIP Int. Conf. on Information Security at 15th World Comput. Congress - IFIP/SEC '98, Vienna - Budapest); 96-107M30
Mihaljević, Miodrag J. A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding2009Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes; 23; 117-139M14
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100M30
Mihaljević, Miodrag J. ; Imai, HidekiA message authentication approach for for information systems1999Info-Science; 7(1); 4-7M50
Mihaljević, Miodrag J. ; Imai, HidekiA method for data access control in certain storage area networks20047th Int. Symp. on Wireless Personal Multimedia Comm. - WPMC2004, Albano Terme, Italy; 3; 488-491M30
Bojanić, Slobodan; Mihaljević, Miodrag J. ; Ognjanović, Zoran A new program for cryptographic authetification control of data2000XLIV Conference of electronics, telecommunications, automation and nuclear engineering ETRAN, Beograd 2000; 72-74M63
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys2005HISC 2005 - Hawaii, IEICE and SITA Joint Conference on Information Theory, Hawaii, USA; 183-188M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA novel fast correlation attack suitable for simple hardware implementation2000Technical report of IEICE. ISEC; JW-ISC'2000, Okinawa, Japan; 99(584); 1-8M30
Mihaljević, Miodrag J. ; Imai, HidekiA Stream Ciphering Approach Based on the Wire-Tap Channel Coding20088th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA time-memory trade-off for the fast correlation attack2000ISITA2000, Hawaii, USA; 55-58M30
Mihaljević, Miodrag J. ; Fossorier, Marc P.C.; Imai, HidekiAn algorithm for cryptanalysis of certain keystream generators suitable for high-speed software and hardware implementations1-Jan-2001IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E84-A(1); 311-318M23
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki; Cui, Yang; Matsuura, KantaAn algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 4329 LNCS; 48-62M23
Mihaljević, Miodrag J. An Algebraic Security Evaluation Approach of Certain Encryption Techniques2016The IPSI BgD Transactions on Advanced Research; 12(2); 38-44M53
Mihaljević, Miodrag J. ; Kavčić, AleksandrarAn Approach for Reduction of the Security Overhead in Smart Grid Communication Infrastructure Employing Dedicated Encryption2013The Twelfth International Conference on Networks - ICN 2013 at IARIA GlobNet-2013, Seville, Spain; 46-52M30
Mihaljević, Miodrag J. An improved key stream generator based on the programmable cellular automata1997Lecture Notes in Computer Science; 1334; 181-191M23
Mihaljević, Miodrag J. ; Tomović, Siniša ; Knežević, Milica An Improved Man-in-the-Middle Attack Against HB# Authentication Protocols2017COST Cryptanalysis of Ubiquitous Computing Systems (CRYPTACUS) Workshop; 163-202M30
Mihaljević, Miodrag J. ; Imai, HidekiAn Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Mode20114th Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, Germany; 21-25M30
Mihaljević, Miodrag J. ; Todorović, Milan ; Maksimović, Petar; Roksandić, S.; Milojević-Jevrić, Marija; Marinković, Bojan Analiza sadržaja baza podataka o ostvarivanju napredne informacione bezbednosti u Cloud Computing2013M80
Mihaljević, Miodrag J. ; Roksandić, S.; Laban, M.; Marinković, Bojan Analiza sadržaja baza podataka o ostvarivanju napredne informacione bezbednosti za M2M (masina-masina) komunikacije u okviru IoT2013M80
Tomović, Siniša ; Knežević, Milica ; Mihaljević, Miodrag J. Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols8-Mar-2021Mathematics; 9(5); 573~M21a