Browsing by Author Fossorier, Marc P. C.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 27  next >
Author(s)TitleIssue DateAppears inRank
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys2005HISC 2005 - Hawaii, IEICE and SITA Joint Conference on Information Theory, Hawaii, USA; 183-188M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA novel fast correlation attack suitable for simple hardware implementation2000Technical report of IEICE. ISEC; JW-ISC'2000, Okinawa, Japan; 99(584); 1-8M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA time-memory trade-off for the fast correlation attack2000ISITA2000, Hawaii, USA; 55-58M30
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki; Cui, Yang; Matsuura, KantaAn algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 4329 LNCS; 48-62M23
Imai, Hideki; Mihaljević, Miodrag J. ; Isaka, M.; Fossorier, Marc P. C.Applications of iterative decoding techniques to cryptography20002nd Int. Symp. on Turbo Codes & Related Topics, Brest, France; 227-234M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiBirthday paradox based security analysis of certain broadcast encryption schemes1-Jan-2007IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E90-A(6); 1248-1251M23
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiCritical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications1-Jan-1999Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1719; 282-293M21
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiCryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks1-Jan-2005Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3797 LNCS; 155-168M23
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiDecimation-based fast correlation attack1-Dec-2007IEEE International Symposium on Information Theory - Proceedings; 456-460
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiFast correlation attack algorithm with list decoding and an application1-Jan-2002Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2355; 196-210M22
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA general formulation of algebraic and fast correlation attacks based on dedicated sample decimation1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3857 LNCS; 203-214M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiAn improved fast correlation attack based on list decoding1-Jan-2003IEEE International Symposium on Information Theory - Proceedings; 165
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiKey management with minimized secret storage employing an erasure channel approach1-Jan-2005IEEE Communications Letters; 9(8); 741-743M21
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA Low-Complexity and High-Performance algorithm for the fast correlation attack1-Jan-2001Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1978; 196-212M21
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiModeling block decoding approaches for the fast correlation attack1-Dec-2007IEEE Transactions on Information Theory; 53(12); 4728-4737M21a
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA novel broadcast encryption based on time-bound cryptographic keys1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); International Conference on Digital Rights Management, DRMTICS 2005 : Digital Rights Management. Technologies, Issues, Challenges and Systems; Sydney, Australia; October 31 - November 2, 2005; 3919 LNCS; 258-276M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiNovel fast correlation attacks via iterative decoding of punctured simplex codes1-Jan-2000IEEE International Symposium on Information Theory - Proceedings; 214M33
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiOn decoding techniques for cryptanalysis of certain encryption algorithms1-Jan-2001IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E84-A(4); 919-930M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiOne-way mapping of keys and the overheads trade-off in key management schemes for broadcast encryption2004Int. Symp. Inform. Theory and its Appl. - ISITA2004, Parma, Italy; 486-491M30
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiReduced Complexity Iterative Decoding of Low Density Parity Check Codes Based on Belief Propagation1998ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 654-658M30