Advanced methods for cryptology and information processing


Project Acronym
PROJECT 144018
 
Project title
Advanced methods for cryptology and information processing
Project Coordinator
 
Start date
01-01-2006
Completion
31-12-2010
 

Publications
(All)



Results 21-40 of 46 (Search time: 0.005 seconds).

Author(s)TitleIssue DateAppears inRank
21Mihaljević, Miodrag J. ; Imai, HidekiA Stream Ciphering Approach Based on the Wire-Tap Channel Coding20088th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18M30
22Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off1-Dec-2007IEEE Communications Letters; 11(12); 988-990M22
23Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiModeling block decoding approaches for the fast correlation attack1-Dec-2007IEEE Transactions on Information Theory; 53(12); 4728-4737M21a
24Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiDecimation-based fast correlation attack1-Dec-2007IEEE International Symposium on Information Theory - Proceedings; 456-460
25Blagojević, Pavle ; Dimitrijević-Blagojević, Aleksandra Using equivariant obstruction theory in combinatorial geometry15-Jul-2007Topology and its Applications; 154(14); 2635-2655M22
26Mihaljević, Miodrag J. Generic framework for the secure Yuen 2000 quantum-encryption protocol employing the wire-tap channel approach24-May-2007Physical Review A - Atomic, Molecular, and Optical Physics; 75(5)M21a
27Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiBirthday paradox based security analysis of certain broadcast encryption schemes1-Jan-2007IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E90-A(6); 1248-1251M23
28Morelos-Zaragoza, Robert; Mihaljević, Miodrag J. Method and apparatus for loss correction and limited reception in streaming data, and data communication apparatus2007M91
29Marković, Zoran ; Mihaljević, Miodrag J. ; Marković, M.; Ognjanović, Zoran ; Perišić, Z.; Marinković, Bojan ; Sobajić, O.Elaborat o uspostavi i podršci za sertikaciju sistema za upravljanje bezbednošću informacija u Sektoru IT bezbednost, Direkcije za IT, Telekoma Srbija2007M80
30Mihaljević, Miodrag J. ; Marković, Zoran ; Perišić, Z.; Marković, M.Metodološka osnova, generički elementi i određena pravila za upravljanje kontinuitetom IT poslovanja i oporavkom sistema u Sektoru za upravljanje IT platformama, Direkcije za IT, Telekoma Srbija2007M80
31Mihaljević, Miodrag J. ; Marković, Zoran ; Ognjanović, Zoran Tehnički izveštaj o evaluaciji kriptografske sigurnosti tehnika za zaštitu govornog servisa Mobilne telefonije, Telekoma Srbije2007M80
32Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129M30
33Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100M30
34Mihaljević, Miodrag J. Tehnički izveštaj o evaluaciji kriptografske sigurnosti i redizajniranom CashTeleport rešenju2007M80
35Mihaljević, Miodrag J. Tehnički izveštaj o evaluaciji kriptografske sigurnosti DocuCrypt rešenja2007M80
36Abe, Masayuki; Aoki, Kazumaro; Ateniese, Giuseppe; Avanzi, Roberto; Beerliová, Zuzana; Billet, Olivier; Biryukov, Alex; Blake, Ian; Boyd, Colin; Brier, Eric; Castiglione, Aniello; Cha, Juyoung; Chan, Aldar; Chen, Liqun; Cho, Kookrae; Contini, Scott; D'Arco, Paolo; Ding, Jintai; Doche, Christophe; Dunkelman, Orr; Fitzi, Matthias; Fouque, Pierre Alain; Fournier, Jacques J.A.; Fujisaki, Kouichi; Fujisaki, Eiichiro; Furukawa, Jun; Galindo, David; Halevi, Shai; Handschuh, Helena; Heneghan, Chris; Holenstein, Thomas; Hoshino, Fumitaka; Hwang, Yong Ho; Isshiki, Toshiyuki; Jochemsz, Ellen; Joux, Antoine; Juels, Ari; Jutla, Charanjit; Kiayias, Aggelos; Kikuchi, Hiroaki; Kobayashi, Tetsutarou; Kohno, Tadayoshi; Krawczyk, Hugo; Kumar, Sandeep; Lange, Tanja; Lee, Jung Wook; Masucci, Barbara; May, Alexander; Mihaljević, Miodrag J. ; Minematsu, Kazuhiko; Monrose, Fabian; Montague, Paul; Myers, Steve; Naccache, David; Nicolosi, Antonio; Obana, Satoshi; Okazaki, Satomi; Okeya, Katsuyuki; Olivier, Francis; Oyono, Roger; Page, Dan; Park, Jung Hyung; Peng, Kun; Pietrzak, Krzysztof; Raub, Dominik; Sakai, Yasuyuki; Sakurai, Kouichi; Schindler, Werner; Seo, Jae Woo; Shin, Jong Hoon; Shparlinski, Igor; Steinfeld, Ron; Szydlo, Mike; Kalai, Yael Tauman; Teranishi, Isamu; Tokita, Toshio; Tunstall, Michael; Vercauteren, Frederik; Villegas, Karine; Walfish, Shabsi; Wang, Huaxiong; Wang, Xiaofeng; Warinschi, Bogdan; De Weger, Benne; Wolf, Christopher; Yampolskiy, Alex; Yang, Yeon Hyeong; Yin, Yiqun Lisa; Yoon, Jeong; Pointcheval, DavidLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface6-Jul-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006; 3960 LNCS
37Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA general formulation of algebraic and fast correlation attacks based on dedicated sample decimation1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3857 LNCS; 203-214M23
38Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA novel broadcast encryption based on time-bound cryptographic keys1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); International Conference on Digital Rights Management, DRMTICS 2005 : Digital Rights Management. Technologies, Issues, Challenges and Systems; Sydney, Australia; October 31 - November 2, 2005; 3919 LNCS; 258-276M23
39Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki; Cui, Yang; Matsuura, KantaAn algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 4329 LNCS; 48-62M23
40Wang, Jian; Mihaljević, Miodrag J. ; Harn, Lein; Imai, HidekiA hierarchical key management approach for secure multicast1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3894 LNCS; 422-434M23