Mihaljević, Miodrag J.
Loading...
3
0
20
0
false
Full Name
Mihaljević, Miodrag J.
ORCID
Scopus Author ID
Country
Serbia
Loading...
2
0
20
0
false
Subject
- 2 Decoding | Fast correlation attack | Keystream generators | Linear feedback shift registers | Stream ciphers
- 1 Algebraic attacks | Cryptanalysis | Decimation | Decoding | Fast correlation attack | Keystream generators | LFSRs | Overdefined systems of nonlinear equations | State transition matrix | Stream ciphers
- 1 Algebraic attacks | Cryptanalysis | Decimation | Hypotheses testing | Overdefined systems of equations | Stream ciphers
- 1 Algebraic attacks | Decimation | Fast correlation attack | LFSRs | Nonlinear combination keystream generator | State transition matrix | Stream ciphers
- 1 Algorithms | Bit error rate | Cryptography | Decoding | Linear equations | Matrix algebra | Polynomials | Probability density function | Vectors
- 1 Algorithms | Computational complexity | Correlation methods | Matrix algebra | Nonlinear filtering | Polynomials
- 1 Binary erasure channel | Broadcasting | Conditional access control | Cryptographic key management
- 1 Binary symmetric channel | Homophonic coding | LPN problem | Pseudo-randomness | Randomness | Stream ciphers
- 1 Birthday paradox | Broadcast encryption | Conditional data access control | Cryptanalysis | Cryptographic key management
- 1 Broadcast encryption | Cryptanalysis | Key management | Time-memory-data trade-off
- next >
Type
- 21 Article
- 19 Conference Paper
Results 1-20 of 40 (Search time: 0.003 seconds).
Author(s) | Title | Issue Date | Appears in | Rank | |
---|---|---|---|---|---|
1 | Mihaljević, Miodrag J. ; Imai, Hideki | An approach for stream ciphers design based on joint computing over random and secret data | 1-Jun-2009 | Computing; 85(1-2); 153-168 | M22 |
2 | Mihaljević, Miodrag J. ; Imai, Hideki | A stream cipher design based on embedding of random bits | 1-Dec-2008 | 2008 International Symposium on Information Theory and its Applications, ISITA2008; International Symposium on Information Theory and its Applications, ISITA2008; Auckland; New Zealand; 7 December 2008 through 10 December 2008; 4895641 | M30 |
3 | Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A cellular automata based HB#-like low complexity authentication technique | 1-Dec-2008 | 2008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008 | |
4 | Mihaljević, Miodrag J. ; Imai, Hideki | A Stream Ciphering Approach Based on the Wire-Tap Channel Coding | 2008 | 8th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18 | M30 |
5 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off | 1-Dec-2007 | IEEE Communications Letters; 11(12); 988-990 | M22 |
6 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Modeling block decoding approaches for the fast correlation attack | 1-Dec-2007 | IEEE Transactions on Information Theory; 53(12); 4728-4737 | M21a |
7 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Decimation-based fast correlation attack | 1-Dec-2007 | IEEE International Symposium on Information Theory - Proceedings; 456-460 | |
8 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Birthday paradox based security analysis of certain broadcast encryption schemes | 1-Jan-2007 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E90-A(6); 1248-1251 | M23 |
9 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129 | M30 |
10 | Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100 | M30 |
11 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3857 LNCS; 203-214 | M23 |
12 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A novel broadcast encryption based on time-bound cryptographic keys | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); International Conference on Digital Rights Management, DRMTICS 2005 : Digital Rights Management. Technologies, Issues, Challenges and Systems; Sydney, Australia; October 31 - November 2, 2005; 3919 LNCS; 258-276 | M23 |
13 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki; Cui, Yang; Matsuura, Kanta | An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 4329 LNCS; 48-62 | M23 |
14 | Wang, Jian; Mihaljević, Miodrag J. ; Harn, Lein; Imai, Hideki | A hierarchical key management approach for secure multicast | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3894 LNCS; 422-434 | M23 |
15 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security weaknesses of certain broadcast encryption schemes | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3919 LNCS; 228-245 | M23 |
16 | Mihaljević, Miodrag J. ; Imai, Hideki | Novel method for implementation of certain key management schemes to minimize secret storage | 1-Jan-2005 | 2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; 2005; 54-59 | |
17 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | A unified analysis for the fast correlation attack | 1-Jan-2005 | IEEE International Symposium on Information Theory - Proceedings; 2005; 2012-2015 | |
18 | Mihaljević, Miodrag J. ; Imai, Hideki | The decimated sample based improved algebraic attacks on the nonlinear filters | 1-Jan-2005 | Lecture Notes in Computer Science; 3352; 310-323 | M23 |
19 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Key management with minimized secret storage employing an erasure channel approach | 1-Jan-2005 | IEEE Communications Letters; 9(8); 741-743 | M21 |
20 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks | 1-Jan-2005 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3797 LNCS; 155-168 | M23 |
Results 1-6 of 6 (Search time: 0.0 seconds).
Acronym | Title | Start date | Completion | P-Investigator |
---|---|---|---|---|
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books | 01-07-2020 | 30-06-2022 | Mihaljević, Miodrag J. | |
PROJECT 0274 | A Software System For Cryptographic Protection of the Electronic Archives | 01-01-2002 | 31-12-2004 | Mihaljević, Miodrag J. |
PROJECT 1625 | Advanced Mathematical Methods for Cryptographic Security and Modelling of Information | 01-01-2002 | 31-12-2005 | Mihaljević, Miodrag J. |
PROJECT 144018 | Advanced methods for cryptology and information processing | 01-01-2006 | 31-12-2010 | Mihaljević, Miodrag J. |
PROJECT 174008 | Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security | 01-01-2011 | 31-12-2019 | Mihaljević, Miodrag J. |
PROJECT 04M02 | Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science | 01-01-1996 | 31-12-2000 | Mihaljević, Miodrag J. |