Browsing by Author Mihaljević, Miodrag J.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 56 to 75 of 191 < previous   next >
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. ; Marković, M.Elaborat o analizi postojećih i mogućnosti implementacije usavršenih i novih za štitnih mehanizama u FIX protokolu2006M80
Marković, Zoran ; Mihaljević, Miodrag J. ; Marković, M.; Ognjanović, Zoran ; Perišić, Z.; Marinković, Bojan ; Sobajić, O.Elaborat o uspostavi i podršci za sertikaciju sistema za upravljanje bezbednošću informacija u Sektoru IT bezbednost, Direkcije za IT, Telekoma Srbija2007M80
Mihaljević, Miodrag J. ; Stijović, D.; Marić, B.; Popadić, S.; Ivanović, M.Elektronska trgovina, elektronski novac i kriptografske tehnike: Jedan osvrt na savremene trendove1999JISA-INFO; 1999(4); 31-34M50
Mihaljević, Miodrag J. ; Kavčić, Aleksandar; Matsuura, KantaAn Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One1-Jan-2016Mathematical Problems in Engineering; 2016M23
Mihaljević, Miodrag J. Evaluacija sigurnosti određenih kriptografskih rešenja - Projekat razvoja i implementacije savremenog eletronskog registra u Republickoj direkciji za imovinu2008M80
Arsić, Aleksandra ; Jelisavčić, Vladislav; Mihaljević, Miodrag J. Experimental Evaluation of Certain Security Issues of Grain v1 Stream CipherJul-2016IPSI BgD Transactions; 12(2); 37-45
Arsić, Aleksandra ; Jelisavčić, Vladisav ; Mihaljević, Miodrag J. Experimental Evaluation of Certain Securty Issues of Grain v1 Stream Cipher2016IPSI BgD Transactions on Internet Research (TIR); 12(2); 37-45M53
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, HidekiA family of fast dedicated one-way hash functions based on linear cellular automata over GF(qr)1-Jan-1999IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E82-A(1); 40-47M23
Mihaljević, Miodrag J. ; Imai, HidekiA family of fast keystream generators based on programmable linear cellular automata over GF (q) and time-variant table1-Jan-1999IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E82-A(1); 32-39M22
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, HidekiFast and secure stream cipher based on cellular automata over GF(q)1-Dec-1998Conference Record / IEEE Global Telecommunications Conference; 6; 3250-3255
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiFast correlation attack algorithm with list decoding and an application1-Jan-2002Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2355; 196-210M22
Mihaljević, Miodrag J. ; Golić, Jovan Dj.A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence1-Jan-1990Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 453 LNCS; 165-175M23
Mihaljević, Miodrag J. A faster cryptanalysis of the self-shrinking generator1-Jan-1996Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1172; 182-189M23
Michael, Lachlan B.; Mihaljević, Miodrag J. ; Haruyama, Shinichiro; Kohno, RyujiA framework for secure download for software-defined radio1-Jul-2002IEEE Communications Magazine; 40(7); 88-96M21a
Mihaljević, Miodrag J. ; Imai, HidekiFramework of a novel technique for algebraic and fast correlation attacks based on dedicated sample decimation2004The State of the Art of Stream Ciphers - SASC2004, Bruge, Belgium; 190-201M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA general formulation of algebraic and fast correlation attacks based on dedicated sample decimation1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3857 LNCS; 203-214M23
Golić, Jovan Dj.; Mihaljević, Miodrag J. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance1-Jan-1991Journal of Cryptology; 3(3); 201-212M22
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiGeneric cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-1281-Oct-2012Periodica Mathematica Hungarica; 65(2); 205-227M23
Mihaljević, Miodrag J. Generic framework for the secure Yuen 2000 quantum-encryption protocol employing the wire-tap channel approach24-May-2007Physical Review A - Atomic, Molecular, and Optical Physics; 75(5)M21a
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiA generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916