Mihaljević, Miodrag J.
Loading...
3
0
20
0
false
Full Name
Mihaljević, Miodrag J.
ORCID
Scopus Author ID
Country
Serbia
Loading...
2
0
20
0
false
Subject
- 1 Algebra | Cryptography | Information theory | Spectroscopy
- 1 Algebraic representations | Error correction coding | Exhaustive search | Pseudorandomness | Secret key | Security evaluation | Stream Ciphers
- 1 Algorithms | Bit error rate | Cryptography | Decoding | Linear equations | Matrix algebra | Polynomials | Probability density function | Vectors
- 1 AMI | Authentication | Cryptography | Encryption | Key Management | Smart Grid
- 1 Authentication | Information theory | Network protocols | Number theory | Random processes | Spectroscopy
- 1 Automata theory | Cryptography | Security of data
- 1 Codes (symbols) | Computational complexity | Correlation methods | Decoding
- 1 Correlation methods | Technical presentations | Fast correlation attack
- 1 Cryptanalysis | Keystream generators | Linear feedback shift registers | Nonlinear filter | Stream ciphers
Date issued
Results 1-20 of 33 (Search time: 0.004 seconds).
Author(s) | Title | Issue Date | Appears in | Rank | |
---|---|---|---|---|---|
1 | Mihaljević, Miodrag J. ; Imai, Hideki | Towards Lightweight Cryptographic Primitives Employing Coding Theory | 2013 | BalkanCrypt 2013 | |
2 | Mihaljević, Miodrag J. ; Imai, Hideki | Cryptography Policy of Japan and CRYPTREC | 2013 | BalkanCrypt 2013 | M31 |
3 | Mihaljević, Miodrag J. ; Imai, Hideki | Contemporary Challenges of Cryptology for Cyber-Security | 2013 | WECT-INFOFEST 2013, WECT-INFOFEST 2013, Montenegro, 30. Sep - 05. Oct, 2013 | M32 |
4 | Mihaljević, Miodrag J. ; Imai, Hideki; David, Michael; Kobara, Kazukuni; Watanabe, Hajime | On advanced cryptographic techniques for information security of smart grid AMI | 1-Dec-2011 | ACM International Conference Proceeding Series; 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11; Oak Ridge, TN; United States; 12 October 2011 through 14 October 2011 | |
5 | Mihaljević, Miodrag J. ; Imai, Hideki | On Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem | 2011 | 2011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark; 1-17 | M30 |
6 | Mihaljević, Miodrag J. ; Imai, Hideki | An Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Mode | 2011 | 4th Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, Germany; 21-25 | M30 |
7 | Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 690-695 | |
8 | Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | A generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916 | |
9 | Mihaljević, Miodrag J. ; Imai, Hideki | A security evaluation of certain stream ciphers which involve randomness and coding | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794 | |
10 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Time-Memory and Time-Memory-Data Trade-Off for Noisy Ciphertext | 2010 | ECRYPT Workshop on Tools for Cryptanalysis 2010; 27-36 | M30 |
11 | Mihaljević, Miodrag J. ; Imai, Hideki | A stream cipher design based on embedding of random bits | 1-Dec-2008 | 2008 International Symposium on Information Theory and its Applications, ISITA2008; International Symposium on Information Theory and its Applications, ISITA2008; Auckland; New Zealand; 7 December 2008 through 10 December 2008; 4895641 | M30 |
12 | Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A cellular automata based HB#-like low complexity authentication technique | 1-Dec-2008 | 2008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008 | |
13 | Mihaljević, Miodrag J. ; Imai, Hideki | A Stream Ciphering Approach Based on the Wire-Tap Channel Coding | 2008 | 8th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18 | M30 |
14 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Decimation-based fast correlation attack | 1-Dec-2007 | IEEE International Symposium on Information Theory - Proceedings; 456-460 | |
15 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129 | M30 |
16 | Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100 | M30 |
17 | Mihaljević, Miodrag J. ; Imai, Hideki | Novel method for implementation of certain key management schemes to minimize secret storage | 1-Jan-2005 | 2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; 2005; 54-59 | |
18 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | A unified analysis for the fast correlation attack | 1-Jan-2005 | IEEE International Symposium on Information Theory - Proceedings; 2005; 2012-2015 | |
19 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys | 2005 | HISC 2005 - Hawaii, IEICE and SITA Joint Conference on Information Theory, Hawaii, USA; 183-188 | M30 |
20 | Mihaljević, Miodrag J. ; Imai, Hideki | A method for data access control in certain storage area networks | 2004 | 7th Int. Symp. on Wireless Personal Multimedia Comm. - WPMC2004, Albano Terme, Italy; 3; 488-491 | M30 |
Results 1-6 of 6 (Search time: 0.001 seconds).
Acronym | Title | Start date | Completion | P-Investigator |
---|---|---|---|---|
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books | 01-07-2020 | 30-06-2022 | Mihaljević, Miodrag J. | |
PROJECT 0274 | A Software System For Cryptographic Protection of the Electronic Archives | 01-01-2002 | 31-12-2004 | Mihaljević, Miodrag J. |
PROJECT 1625 | Advanced Mathematical Methods for Cryptographic Security and Modelling of Information | 01-01-2002 | 31-12-2005 | Mihaljević, Miodrag J. |
PROJECT 144018 | Advanced methods for cryptology and information processing | 01-01-2006 | 31-12-2010 | Mihaljević, Miodrag J. |
PROJECT 174008 | Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security | 01-01-2011 | 31-12-2019 | Mihaljević, Miodrag J. |
PROJECT 04M02 | Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science | 01-01-1996 | 31-12-2000 | Mihaljević, Miodrag J. |