Showing results 1 to 20 of 225
next >
Author(s) | Title | Issue Date | Appears in | Rank |
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, Hideki | A Fast Cryptographic Hash Function Based on Cellular Automata over GF(q) | 1998 | Global IT Security, IFIP (14th IFIP Int. Conf. on Information Security at 15th World Comput. Congress - IFIP/SEC '98, Vienna - Budapest); 96-107 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | A message authentication approach for for information systems | 1999 | Info-Science; 7(1); 4-7 | M50 |
Mihaljević, Miodrag J. ; Imai, Hideki | A method for data access control in certain storage area networks | 2004 | 7th Int. Symp. on Wireless Personal Multimedia Comm. - WPMC2004, Albano Terme, Italy; 3; 488-491 | M30 |
Bojanić, Slobodan; Mihaljević, Miodrag J. ; Ognjanović, Zoran | A new program for cryptographic authetification control of data | 2000 | XLIV Conference of electronics, telecommunications, automation and nuclear engineering ETRAN, Beograd 2000; 72-74 | M63 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys | 2005 | HISC 2005 - Hawaii, IEICE and SITA Joint Conference on Information Theory, Hawaii, USA; 183-188 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A novel fast correlation attack suitable for simple hardware implementation | 2000 | Technical report of IEICE. ISEC; JW-ISC'2000, Okinawa, Japan; 99(584); 1-8 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A time-memory trade-off for the fast correlation attack | 2000 | ISITA2000, Hawaii, USA; 55-58 | M30 |
Mihaljević, Miodrag J. | Advances in techniques for blockchain technology and encryption - Invited talk | 2022 | India-Serbia Workshop on Selected Topics of Artificial Intelligence and Information Technology Techniques and Applications, Belgrade, Serbia, 13-15 June 2022.; Book of Abstracts | M32 |
Mihaljević, Miodrag J. ; Fossorier, Marc P.C.; Imai, Hideki | An algorithm for cryptanalysis of certain keystream generators suitable for high-speed software and hardware implementations | 1-Jan-2001 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E84-A(1); 311-318 | M23 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki; Cui, Yang; Matsuura, Kanta | An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 4329 LNCS; 48-62 | M23 |
Mihaljević, Miodrag J. ; Gangopadhyay, S.; Paul, G.; Imai, H. | An Algorithm for the Internal State Recoverz of Grain-v1 | 2011 | Record of the 11th Central European Conference on Cryptology, Hungary, 30. Jun - 02. Jul, 2011; 1-14 | M33 |
Mihaljević, Miodrag J. | An Algebraic Security Evaluation Approach of Certain Encryption Techniques | 2016 | The IPSI BgD Transactions on Advanced Research; 12(2); 38-44 | M53 |
Mihaljević, Miodrag J. ; Kavčić, Aleksandrar | An Approach for Reduction of the Security Overhead in Smart Grid Communication Infrastructure Employing Dedicated Encryption | 2013 | The Twelfth International Conference on Networks - ICN 2013 at IARIA GlobNet-2013, Seville, Spain; 46-52 | M30 |
Mihaljević, Miodrag J. | An improved key stream generator based on the programmable cellular automata | 1997 | Lecture Notes in Computer Science; 1334; 181-191 | M23 |
Mihaljević, Miodrag J. ; Tomović, Siniša ; Knežević, Milica | An Improved Man-in-the-Middle Attack Against HB# Authentication Protocols | 2017 | COST Cryptanalysis of Ubiquitous Computing Systems (CRYPTACUS) Workshop; 163-202 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | An Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Mode | 2011 | 4th Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, Germany; 21-25 | M30 |
Mihaljević, Miodrag J. ; Todorović, Milan ; Maksimović, Petar; Roksandić, S.; Milojević-Jevrić, Marija; Marinković, Bojan | Analiza sadržaja baza podataka o ostvarivanju napredne informacione bezbednosti u Cloud Computing | 2013 | | M80 |
Mihaljević, Miodrag J. ; Roksandić, S.; Laban, M.; Marinković, Bojan | Analiza sadržaja baza podataka o ostvarivanju napredne informacione bezbednosti za M2M (masina-masina) komunikacije u okviru IoT | 2013 | | M80 |
Tomović, Siniša ; Knežević, Milica ; Mihaljević, Miodrag J. | Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols | 8-Mar-2021 | Mathematics; 9(5); 573 | ~M21a |
Imai, Hideki; Mihaljević, Miodrag J. ; Isaka, M.; Fossorier, Marc P. C. | Applications of iterative decoding techniques to cryptography | 2000 | 2nd Int. Symp. on Turbo Codes & Related Topics, Brest, France; 227-234 | M30 |