Showing results 63 to 82 of 191
< previous
next >
Author(s) | Title | Issue Date | Appears in | Rank |
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, Hideki | A family of fast dedicated one-way hash functions based on linear cellular automata over GF(qr) | 1-Jan-1999 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E82-A(1); 40-47 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | A family of fast keystream generators based on programmable linear cellular automata over GF (q) and time-variant table | 1-Jan-1999 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E82-A(1); 32-39 | M22 |
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, Hideki | Fast and secure stream cipher based on cellular automata over GF(q) | 1-Dec-1998 | Conference Record / IEEE Global Telecommunications Conference; 6; 3250-3255 | |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Fast correlation attack algorithm with list decoding and an application | 1-Jan-2002 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2355; 196-210 | M22 |
Mihaljević, Miodrag J. ; Golić, Jovan Dj. | A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence | 1-Jan-1990 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 453 LNCS; 165-175 | M23 |
Mihaljević, Miodrag J. | A faster cryptanalysis of the self-shrinking generator | 1-Jan-1996 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1172; 182-189 | M23 |
Michael, Lachlan B.; Mihaljević, Miodrag J. ; Haruyama, Shinichiro; Kohno, Ryuji | A framework for secure download for software-defined radio | 1-Jul-2002 | IEEE Communications Magazine; 40(7); 88-96 | M21a |
Mihaljević, Miodrag J. ; Imai, Hideki | Framework of a novel technique for algebraic and fast correlation attacks based on dedicated sample decimation | 2004 | The State of the Art of Stream Ciphers - SASC2004, Bruge, Belgium; 190-201 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3857 LNCS; 203-214 | M23 |
Golić, Jovan Dj.; Mihaljević, Miodrag J. | A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance | 1-Jan-1991 | Journal of Cryptology; 3(3); 201-212 | M22 |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128 | 1-Oct-2012 | Periodica Mathematica Hungarica; 65(2); 205-227 | M23 |
Mihaljević, Miodrag J. | Generic framework for the secure Yuen 2000 quantum-encryption protocol employing the wire-tap channel approach | 24-May-2007 | Physical Review A - Atomic, Molecular, and Optical Physics; 75(5) | M21a |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | A generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916 | |
Wang, Jian; Mihaljević, Miodrag J. ; Harn, Lein; Imai, Hideki | A hierarchical key management approach for secure multicast | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3894 LNCS; 422-434 | M23 |
Mihaljević, Miodrag J. | Illustrative Examples on Interactions of Artificial Intelligence and Blockchain Technology - Keynote Talk | 2022 | International High-End Technology Seminar on Artificial Inteligence, Jinan, China, 13-15 Sept. 2022 | M32 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | An improved fast correlation attack based on list decoding | 1-Jan-2003 | IEEE International Symposium on Information Theory - Proceedings; 165 | |
Mihaljević, Miodrag J. | Informaciona bzbednost i blokčejn tehnologija | 2022 | | M99 |
Oggier, Frederique; Mihaljević, Miodrag J. | An information-theoretic security evaluation of a class of randomized encryption schemes | 1-Feb-2014 | IEEE Transactions on Information Forensics and Security; 9(2); 158-168 | M21a |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | Internal state recovery of Grain-v1 employing normality order of the filter function | 1-Jun-2012 | IET Information Security; 6(2); 55-64 | M23 |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function | 15-Nov-2012 | Information Processing Letters; 112(21); 805-810 | M23 |