Browsing by Author Imai, Hideki


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 15 to 34 of 62 < previous   next >
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA cellular automata based HB#-like low complexity authentication technique1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008
Mihaljević, Miodrag J. ; Imai, HidekiConstruction of Fast MAC Based on Linear Cellular Automata over GF(q)1998ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 40-43M30
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiCritical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications1-Jan-1999Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1719; 282-293M21
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiCryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks1-Jan-2005Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3797 LNCS; 155-168M23
Mihaljević, Miodrag J. ; Imai, HidekiCryptanalysis of TOYOCRYPT-HS1 stream cipher1-Jan-2002IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E85-A(1); 66-73M23
Mihaljević, Miodrag J. ; Imai, HidekiThe decimated sample based improved algebraic attacks on the nonlinear filters1-Jan-2005Lecture Notes in Computer Science; 3352; 310-323M23
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiDecimation-based fast correlation attack1-Dec-2007IEEE International Symposium on Information Theory - Proceedings; 456-460
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, HidekiA family of fast dedicated one-way hash functions based on linear cellular automata over GF(qr)1-Jan-1999IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E82-A(1); 40-47M23
Mihaljević, Miodrag J. ; Imai, HidekiA family of fast keystream generators based on programmable linear cellular automata over GF (q) and time-variant table1-Jan-1999IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E82-A(1); 32-39M22
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, HidekiFast and secure stream cipher based on cellular automata over GF(q)1-Dec-1998Conference Record / IEEE Global Telecommunications Conference; 6; 3250-3255
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiFast correlation attack algorithm with list decoding and an application1-Jan-2002Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2355; 196-210M22
Mihaljević, Miodrag J. ; Imai, HidekiFramework of a novel technique for algebraic and fast correlation attacks based on dedicated sample decimation2004The State of the Art of Stream Ciphers - SASC2004, Bruge, Belgium; 190-201M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA general formulation of algebraic and fast correlation attacks based on dedicated sample decimation1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3857 LNCS; 203-214M23
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiGeneric cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-1281-Oct-2012Periodica Mathematica Hungarica; 65(2); 205-227M23
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiA generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916
Wang, Jian; Mihaljević, Miodrag J. ; Harn, Lein; Imai, HidekiA hierarchical key management approach for secure multicast1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3894 LNCS; 422-434M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiAn improved fast correlation attack based on list decoding1-Jan-2003IEEE International Symposium on Information Theory - Proceedings; 165
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiInternal state recovery of Grain-v1 employing normality order of the filter function1-Jun-2012IET Information Security; 6(2); 55-64M23
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiInternal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function15-Nov-2012Information Processing Letters; 112(21); 805-810M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiKey management with minimized secret storage employing an erasure channel approach1-Jan-2005IEEE Communications Letters; 9(8); 741-743M21