Loading... 3 0 20 0 false
Full Name
Mihaljević, Miodrag J.
Scopus Author ID
Country
Serbia
Loading... 2 0 20 0 false


Refined By:
Author:  Imai, Hideki

Results 1-20 of 65 (Search time: 0.005 seconds).

Author(s)TitleIssue DateAppears inRank
1Mihaljević, Miodrag J. ; Imai, HidekiPrivacy Preserving Light-Weight Authentication Based on a Variant of Niederreiter Public-Key Encryption2015The IPSI BgD Transactions on Advanced Research; 11(1); 6-12M53
2Mihaljević, Miodrag J. ; Imai, HidekiSecurity issues of cloud computing and an encryption approach31-Oct-2014Cloud Technology: Concepts, Methodologies, Tools, and Applications; 3; 1527-1547
3Mihaljević, Miodrag J. ; Imai, HidekiSecurity Issues of Cloud Computing and an Encryption Approach2014Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education; 388-408M14
4Mihaljević, Miodrag J. ; Imai, HidekiTowards Lightweight Cryptographic Primitives Employing Coding Theory2013BalkanCrypt 2013
5Mihaljević, Miodrag J. ; Imai, HidekiCryptography Policy of Japan and CRYPTREC2013BalkanCrypt 2013M31
6Mihaljević, Miodrag J. ; Imai, HidekiContemporary Challenges of Cryptology for Cyber-Security2013WECT-INFOFEST 2013, WECT-INFOFEST 2013, Montenegro, 30. Sep - 05. Oct, 2013M32
7Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiInternal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function15-Nov-2012Information Processing Letters; 112(21); 805-810M23
8Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiGeneric cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-1281-Oct-2012Periodica Mathematica Hungarica; 65(2); 205-227M23
9Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiInternal state recovery of Grain-v1 employing normality order of the filter function1-Jun-2012IET Information Security; 6(2); 55-64M23
10Mihaljević, Miodrag J. ; Imai, Hideki; David, Michael; Kobara, Kazukuni; Watanabe, HajimeOn advanced cryptographic techniques for information security of smart grid AMI1-Dec-2011ACM International Conference Proceeding Series; 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11; Oak Ridge, TN; United States; 12 October 2011 through 14 October 2011
11Mihaljević, Miodrag J. ; Imai, HidekiOn Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem20112011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark; 1-17M30
12Mihaljević, Miodrag J. ; Imai, HidekiAn Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Mode20114th Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, Germany; 21-25M30
13Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 690-695
14Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiA generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916
15Mihaljević, Miodrag J. ; Imai, HidekiA security evaluation of certain stream ciphers which involve randomness and coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794
16Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiTime-Memory and Time-Memory-Data Trade-Off for Noisy Ciphertext2010ECRYPT Workshop on Tools for Cryptanalysis 2010; 27-36M30
17Mihaljević, Miodrag J. ; Imai, HidekiAn approach for stream ciphers design based on joint computing over random and secret data1-Jun-2009Computing; 85(1-2); 153-168M22
18Mihaljević, Miodrag J. ; Imai, HidekiA stream cipher design based on embedding of random bits1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008; International Symposium on Information Theory and its Applications, ISITA2008; Auckland; New Zealand; 7 December 2008 through 10 December 2008; 4895641M30
19Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA cellular automata based HB#-like low complexity authentication technique1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008
20Mihaljević, Miodrag J. ; Imai, HidekiA Stream Ciphering Approach Based on the Wire-Tap Channel Coding20088th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18M30

Projects



Results 1-6 of 6 (Search time: 0.002 seconds).

AcronymTitleStart dateCompletionP-Investigator
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books01-07-202030-06-2022Mihaljević, Miodrag J.
PROJECT 0274A Software System For Cryptographic Protection of the Electronic Archives01-01-200231-12-2004Mihaljević, Miodrag J.
PROJECT 1625Advanced Mathematical Methods for Cryptographic Security and Modelling of Information01-01-200231-12-2005Mihaljević, Miodrag J.
PROJECT 144018Advanced methods for cryptology and information processing01-01-200631-12-2010Mihaljević, Miodrag J.
PROJECT 174008Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security01-01-201131-12-2019Mihaljević, Miodrag J.
PROJECT 04M02Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science01-01-199631-12-2000Mihaljević, Miodrag J.