Loading... 3 0 20 0 false
Full Name
Mihaljević, Miodrag J.
Scopus Author ID
Country
Serbia
Loading... 2 0 20 0 false

Refined By:
Type:  Conference Paper
Author:  Imai, Hideki

Results 1-20 of 33 (Search time: 0.004 seconds).

Author(s)TitleIssue DateAppears inRank
1Mihaljević, Miodrag J. ; Imai, HidekiTowards Lightweight Cryptographic Primitives Employing Coding Theory2013BalkanCrypt 2013
2Mihaljević, Miodrag J. ; Imai, HidekiCryptography Policy of Japan and CRYPTREC2013BalkanCrypt 2013M31
3Mihaljević, Miodrag J. ; Imai, HidekiContemporary Challenges of Cryptology for Cyber-Security2013WECT-INFOFEST 2013, WECT-INFOFEST 2013, Montenegro, 30. Sep - 05. Oct, 2013M32
4Mihaljević, Miodrag J. ; Imai, Hideki; David, Michael; Kobara, Kazukuni; Watanabe, HajimeOn advanced cryptographic techniques for information security of smart grid AMI1-Dec-2011ACM International Conference Proceeding Series; 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11; Oak Ridge, TN; United States; 12 October 2011 through 14 October 2011
5Mihaljević, Miodrag J. ; Imai, HidekiOn Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem20112011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark; 1-17M30
6Mihaljević, Miodrag J. ; Imai, HidekiAn Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Mode20114th Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, Germany; 21-25M30
7Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 690-695
8Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiA generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916
9Mihaljević, Miodrag J. ; Imai, HidekiA security evaluation of certain stream ciphers which involve randomness and coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794
10Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiTime-Memory and Time-Memory-Data Trade-Off for Noisy Ciphertext2010ECRYPT Workshop on Tools for Cryptanalysis 2010; 27-36M30
11Mihaljević, Miodrag J. ; Imai, HidekiA stream cipher design based on embedding of random bits1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008; International Symposium on Information Theory and its Applications, ISITA2008; Auckland; New Zealand; 7 December 2008 through 10 December 2008; 4895641M30
12Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA cellular automata based HB#-like low complexity authentication technique1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008
13Mihaljević, Miodrag J. ; Imai, HidekiA Stream Ciphering Approach Based on the Wire-Tap Channel Coding20088th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18M30
14Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiDecimation-based fast correlation attack1-Dec-2007IEEE International Symposium on Information Theory - Proceedings; 456-460
15Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129M30
16Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100M30
17Mihaljević, Miodrag J. ; Imai, HidekiNovel method for implementation of certain key management schemes to minimize secret storage1-Jan-20052005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; 2005; 54-59
18Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA unified analysis for the fast correlation attack1-Jan-2005IEEE International Symposium on Information Theory - Proceedings; 2005; 2012-2015
19Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys2005HISC 2005 - Hawaii, IEICE and SITA Joint Conference on Information Theory, Hawaii, USA; 183-188M30
20Mihaljević, Miodrag J. ; Imai, HidekiA method for data access control in certain storage area networks20047th Int. Symp. on Wireless Personal Multimedia Comm. - WPMC2004, Albano Terme, Italy; 3; 488-491M30

Projects



Results 1-6 of 6 (Search time: 0.001 seconds).

AcronymTitleStart dateCompletionP-Investigator
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books01-07-202030-06-2022Mihaljević, Miodrag J.
PROJECT 0274A Software System For Cryptographic Protection of the Electronic Archives01-01-200231-12-2004Mihaljević, Miodrag J.
PROJECT 1625Advanced Mathematical Methods for Cryptographic Security and Modelling of Information01-01-200231-12-2005Mihaljević, Miodrag J.
PROJECT 144018Advanced methods for cryptology and information processing01-01-200631-12-2010Mihaljević, Miodrag J.
PROJECT 174008Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security01-01-201131-12-2019Mihaljević, Miodrag J.
PROJECT 04M02Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science01-01-199631-12-2000Mihaljević, Miodrag J.