Loading... 3 0 20 0 false
Full Name
Mihaljević, Miodrag J.
Scopus Author ID
Country
Serbia
Loading... 2 0 20 0 false

Refined By:
Date Issued:  [2000 TO 2009]
Type:  Conference Paper

Results 1-20 of 23 (Search time: 0.005 seconds).

Author(s)TitleIssue DateAppears inRank
1Mihaljević, Miodrag J. ; Imai, HidekiA stream cipher design based on embedding of random bits1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008; International Symposium on Information Theory and its Applications, ISITA2008; Auckland; New Zealand; 7 December 2008 through 10 December 2008; 4895641M30
2Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA cellular automata based HB#-like low complexity authentication technique1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008
3Mihaljević, Miodrag J. ; Imai, HidekiA Stream Ciphering Approach Based on the Wire-Tap Channel Coding20088th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18M30
4Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiDecimation-based fast correlation attack1-Dec-2007IEEE International Symposium on Information Theory - Proceedings; 456-460
5Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129M30
6Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100M30
7Mihaljević, Miodrag J. ; Imai, HidekiNovel method for implementation of certain key management schemes to minimize secret storage1-Jan-20052005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; 2005; 54-59
8Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA unified analysis for the fast correlation attack1-Jan-2005IEEE International Symposium on Information Theory - Proceedings; 2005; 2012-2015
9Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys2005HISC 2005 - Hawaii, IEICE and SITA Joint Conference on Information Theory, Hawaii, USA; 183-188M30
10Mihaljević, Miodrag J. ; Imai, HidekiA method for data access control in certain storage area networks20047th Int. Symp. on Wireless Personal Multimedia Comm. - WPMC2004, Albano Terme, Italy; 3; 488-491M30
11Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiOne-way mapping of keys and the overheads trade-off in key management schemes for broadcast encryption2004Int. Symp. Inform. Theory and its Appl. - ISITA2004, Parma, Italy; 486-491M30
12Mihaljević, Miodrag J. ; Imai, HidekiFramework of a novel technique for algebraic and fast correlation attacks based on dedicated sample decimation2004The State of the Art of Stream Ciphers - SASC2004, Bruge, Belgium; 190-201M30
13Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiAn improved fast correlation attack based on list decoding1-Jan-2003IEEE International Symposium on Information Theory - Proceedings; 165
14Michael, Lachlan B.; Mihaljević, Miodrag J. ; Haruyama, Shinichiro; Kohno, RyujiA proposal of architectural, elements for implementing secure software download service in software defined radio1-Dec-2002IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC; 1; 442-446
15Mihaljević, Miodrag J. ; Imai, HidekiCryptanalysis of TOYOCRYPT-HS1 stream cipher1-Jan-2002IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E85-A(1); 66-73M23
16Mihaljević, Miodrag J. ; Kohno, RyujiOn a framework for employment of cryptographic components in software defined radio1-Jan-2002International Symposium on Wireless Personal Multimedia Communications, WPMC; 2; 835-839
17Mihaljević, Miodrag J. ; Kohno, RyujiOn wireless communications privacy and security evaluation of encryption techniques1-Jan-2002IEEE Wireless Communications and Networking Conference, WCNC; 2; 865-868
18Mihaljević, Miodrag J. ; Imai, HidekiOn employment of different weight parity-checks for the fast correlation attack1-Jan-2001IEEE International Symposium on Information Theory - Proceedings; IEEE International Symposium on Information Theory (ISIT 2001); Washington, DC; United States; 24 June 2001 through 29 June 2001; 119M23
19Bojanić, Slobodan; Mihaljević, Miodrag J. ; Ognjanović, Zoran A new program for cryptographic authetification control of data2000XLIV Conference of electronics, telecommunications, automation and nuclear engineering ETRAN, Beograd 2000; 72-74M63
20Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA novel fast correlation attack suitable for simple hardware implementation2000Technical report of IEICE. ISEC; JW-ISC'2000, Okinawa, Japan; 99(584); 1-8M30

Projects



Results 1-6 of 6 (Search time: 0.001 seconds).

AcronymTitleStart dateCompletionP-Investigator
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books01-07-202030-06-2022Mihaljević, Miodrag J.
PROJECT 0274A Software System For Cryptographic Protection of the Electronic Archives01-01-200231-12-2004Mihaljević, Miodrag J.
PROJECT 1625Advanced Mathematical Methods for Cryptographic Security and Modelling of Information01-01-200231-12-2005Mihaljević, Miodrag J.
PROJECT 144018Advanced methods for cryptology and information processing01-01-200631-12-2010Mihaljević, Miodrag J.
PROJECT 174008Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security01-01-201131-12-2019Mihaljević, Miodrag J.
PROJECT 04M02Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science01-01-199631-12-2000Mihaljević, Miodrag J.