Browsing by Author Mihaljević, Miodrag J.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 33 to 52 of 191 < previous   next >
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiBirthday paradox based security analysis of certain broadcast encryption schemes1-Jan-2007IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E90-A(6); 1248-1251M23
Mihaljević, Miodrag J. Bitcoin, Blockchain Technology and Cryptography - An Illustration of Certain Issues2020Anali ogranka SANU u Novom Sadu; 41-47
Mihaljević, Miodrag J. A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off30-Jul-2020IEEE Access; 8; 141258-141268M21
Mihaljević, Miodrag J. A Blockchain Consensus Protocol with Flexible Requirement of the Resources202014th International Online Conference on Mathematical Scences for Advancement of Science and Technology, December 21-23, IndiaM30
Mihaljević, Miodrag J. Broadcast encryption schemes based on the sectioned key tree1-Dec-2003Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2836; 158-169M23
Mileva, Aleksandra; Dimitrova, Vesna; Kara, Orhun; Mihaljević, Miodrag J. Catalog and Illustrative Examples on Lightweight Cryptographic Primitives2021Security of Ubiquitous Computing Systems; 21-47M14
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA cellular automata based HB#-like low complexity authentication technique1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imal, HidekiA cellular automaton based fast one-way hash function suitable for hardware implementation1-Jan-1998Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1431; 217-233M23
Mihaljević, Miodrag J. ; Matsuura, K.Communication Data Encryption/decryption Method And System2020M91
Mihaljević, Miodrag J. ; Golić, Jovan Dj.A comparison of cryptanalytic principles based on iterative error-correction1-Jan-1991Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 547 LNCS; 527-531M23
Mihaljević, Miodrag J. ; Imai, HidekiConstruction of Fast MAC Based on Linear Cellular Automata over GF(q)1998ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 40-43M30
Mihaljević, Miodrag J. ; Golić, Jovan Dj.Convergence of a bayesian iterative error-correction procedure on a noisy shift register sequence24-May-1993Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 658 LNCS; 124-137M23
Mihaljević, Miodrag J. A Correlation attack on the binary sequence generators with time-varying output function1-Jan-1995Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); International Conference on the Theory and Application of Cryptology, ASIACRYPT 1994: Advances in Cryptology — ASIACRYPT'94; Wollongong, Australia; November 28 – December 1, 1994; 917; 65-79M23
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiCritical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications1-Jan-1999Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1719; 282-293M21
Mihaljević, Miodrag J. ; Kohno, RyujiCryptanalysis of fast encryption algorithm for multimedia FEA-M1-Sep-2002IEEE Communications Letters; 6(9); 382-384M21
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiCryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks1-Jan-2005Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3797 LNCS; 155-168M23
Mihaljević, Miodrag J. ; Imai, HidekiCryptanalysis of TOYOCRYPT-HS1 stream cipher1-Jan-2002IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E85-A(1); 66-73M23
Mihaljević, Miodrag J. ; Abe, JoujiData processing method2010M91
Mihaljević, Miodrag J. ; Abe, JoujiData Processing Method, Program Thereof, Data Processor, and Receiver2010M91
Mihaljević, Miodrag J. ; Imai, HidekiThe decimated sample based improved algebraic attacks on the nonlinear filters1-Jan-2005Lecture Notes in Computer Science; 3352; 310-323M23