Mihaljević, Miodrag J.
Loading...
3
0
20
0
false
Full Name
Mihaljević, Miodrag J.
ORCID
Scopus Author ID
Country
Serbia
Loading...
2
0
20
0
false
Subject
- 2 Decoding | Fast correlation attack | Keystream generators | Linear feedback shift registers | Stream ciphers
- 1 Algebraic attacks | Cryptanalysis | Decimation | Decoding | Fast correlation attack | Keystream generators | LFSRs | Overdefined systems of nonlinear equations | State transition matrix | Stream ciphers
- 1 Algebraic attacks | Cryptanalysis | Decimation | Hypotheses testing | Overdefined systems of equations | Stream ciphers
- 1 Algebraic attacks | Decimation | Fast correlation attack | LFSRs | Nonlinear combination keystream generator | State transition matrix | Stream ciphers
- 1 Algorithms | Computational complexity | Correlation methods | Matrix algebra | Nonlinear filtering | Polynomials
- 1 Authentification | Encryption | Security | Software defined radio
- 1 Binary erasure channel | Broadcasting | Conditional access control | Cryptographic key management
- 1 Binary symmetric channel | Homophonic coding | LPN problem | Pseudo-randomness | Randomness | Stream ciphers
- 1 Birthday paradox | Broadcast encryption | Conditional data access control | Cryptanalysis | Cryptographic key management
- 1 Boolean matrices | Chosen plaintext attack | Crypt-analysis | Encryption | Known plaintext attack
- next >
Results 1-20 of 31 (Search time: 0.006 seconds).
Author(s) | Title | Issue Date | Appears in | Rank | |
---|---|---|---|---|---|
1 | Mihaljević, Miodrag J. ; Imai, Hideki | An approach for stream ciphers design based on joint computing over random and secret data | 1-Jun-2009 | Computing; 85(1-2); 153-168 | M22 |
2 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off | 1-Dec-2007 | IEEE Communications Letters; 11(12); 988-990 | M22 |
3 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Modeling block decoding approaches for the fast correlation attack | 1-Dec-2007 | IEEE Transactions on Information Theory; 53(12); 4728-4737 | M21a |
4 | Mihaljević, Miodrag J. | Generic framework for the secure Yuen 2000 quantum-encryption protocol employing the wire-tap channel approach | 24-May-2007 | Physical Review A - Atomic, Molecular, and Optical Physics; 75(5) | M21a |
5 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Birthday paradox based security analysis of certain broadcast encryption schemes | 1-Jan-2007 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E90-A(6); 1248-1251 | M23 |
6 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3857 LNCS; 203-214 | M23 |
7 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A novel broadcast encryption based on time-bound cryptographic keys | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); International Conference on Digital Rights Management, DRMTICS 2005 : Digital Rights Management. Technologies, Issues, Challenges and Systems; Sydney, Australia; October 31 - November 2, 2005; 3919 LNCS; 258-276 | M23 |
8 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki; Cui, Yang; Matsuura, Kanta | An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 4329 LNCS; 48-62 | M23 |
9 | Wang, Jian; Mihaljević, Miodrag J. ; Harn, Lein; Imai, Hideki | A hierarchical key management approach for secure multicast | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3894 LNCS; 422-434 | M23 |
10 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security weaknesses of certain broadcast encryption schemes | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3919 LNCS; 228-245 | M23 |
11 | Mihaljević, Miodrag J. ; Imai, Hideki | The decimated sample based improved algebraic attacks on the nonlinear filters | 1-Jan-2005 | Lecture Notes in Computer Science; 3352; 310-323 | M23 |
12 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Key management with minimized secret storage employing an erasure channel approach | 1-Jan-2005 | IEEE Communications Letters; 9(8); 741-743 | M21 |
13 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks | 1-Jan-2005 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3797 LNCS; 155-168 | M23 |
14 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Secret-public storage trade-off for broadcast encryption key management | 1-Dec-2004 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3269; 375-387 | M23 |
15 | Mihaljević, Miodrag J. | Reconfigurable key management for broadcast encryption | 1-Jan-2004 | IEEE Communications Letters; 8(7); 440-442 | M21 |
16 | Camion, Paul; Mihaljević, Miodrag J. ; Imai, Hideki | Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q) | 1-Dec-2003 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2595; 196-213 | M23 |
17 | Mihaljević, Miodrag J. | Key management schemes for stateless receivers based on time varying heterogeneous logical key hierarchy | 1-Dec-2003 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2894; 137-154 | M23 |
18 | Mihaljević, Miodrag J. | Broadcast encryption schemes based on the sectioned key tree | 1-Dec-2003 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2836; 158-169 | M23 |
19 | Mihaljević, Miodrag J. | On vulnerabilities and improvements of fast encryption algorithm for multimedia FEA-M | 1-Jan-2003 | IEEE Transactions on Consumer Electronics; 49(4); 1199-1207 | M22 |
20 | Michael, Lachlan B.; Mihaljević, Miodrag J. ; Haruyama, Shinichiro; Kohno, Ryuji | Security issues for software defined radio: Design of a secure download system | 1-Jan-2003 | IEICE Transactions on Communications; E85-B(12); 2588-2600 | M22 |
Results 1-6 of 6 (Search time: 0.001 seconds).
Acronym | Title | Start date | Completion | P-Investigator |
---|---|---|---|---|
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books | 01-07-2020 | 30-06-2022 | Mihaljević, Miodrag J. | |
PROJECT 0274 | A Software System For Cryptographic Protection of the Electronic Archives | 01-01-2002 | 31-12-2004 | Mihaljević, Miodrag J. |
PROJECT 1625 | Advanced Mathematical Methods for Cryptographic Security and Modelling of Information | 01-01-2002 | 31-12-2005 | Mihaljević, Miodrag J. |
PROJECT 144018 | Advanced methods for cryptology and information processing | 01-01-2006 | 31-12-2010 | Mihaljević, Miodrag J. |
PROJECT 174008 | Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security | 01-01-2011 | 31-12-2019 | Mihaljević, Miodrag J. |
PROJECT 04M02 | Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science | 01-01-1996 | 31-12-2000 | Mihaljević, Miodrag J. |