Showing results 41 to 60 of 225
< previous
next >
Author(s) | Title | Issue Date | Appears in | Rank |
Mileva, Aleksandra; Dimitrova, Vesna; Kara, Orhun; Mihaljević, Miodrag J. | Catalog and Illustrative Examples on Lightweight Cryptographic Primitives | 2021 | Security of Ubiquitous Computing Systems; 21-47 | M14 |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A cellular automata based HB#-like low complexity authentication technique | 1-Dec-2008 | 2008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008 | |
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imal, Hideki | A cellular automaton based fast one-way hash function suitable for hardware implementation | 1-Jan-1998 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1431; 217-233 | M23 |
Mihaljević, Miodrag J. ; Matsuura, K. | Communication Data Encryption/decryption Method And System | 2020 | | M91 |
Mihaljević, Miodrag J. ; Golić, Jovan Dj. | A comparison of cryptanalytic principles based on iterative error-correction | 1-Jan-1991 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 547 LNCS; 527-531 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | Construction of Fast MAC Based on Linear Cellular Automata over GF(q) | 1998 | ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 40-43 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | Contemporary Challenges of Cryptology for Cyber-Security | 2013 | WECT-INFOFEST 2013, WECT-INFOFEST 2013, Montenegro, 30. Sep - 05. Oct, 2013 | M32 |
Mihaljević, Miodrag J. ; Golić, Jovan Dj. | Convergence of a bayesian iterative error-correction procedure on a noisy shift register sequence | 24-May-1993 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 658 LNCS; 124-137 | M23 |
Mihaljević, Miodrag J. | A Correlation attack on the binary sequence generators with time-varying output function | 1-Jan-1995 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); International Conference on the Theory and Application of Cryptology, ASIACRYPT 1994: Advances in Cryptology — ASIACRYPT'94; Wollongong, Australia; November 28 – December 1, 1994; 917; 65-79 | M23 |
Mihaljević, Miodrag J. | Critical Infrastructures Research Eco_System in Serbia | 2018 | NSF – Serbia & West Balkan Data Science Workshop, Beograd, 27. - 29. Aug, 2018 | M32 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications | 1-Jan-1999 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1719; 282-293 | M21 |
Mihaljević, Miodrag J. ; Kohno, Ryuji | Cryptanalysis of fast encryption algorithm for multimedia FEA-M | 1-Sep-2002 | IEEE Communications Letters; 6(9); 382-384 | M21 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks | 1-Jan-2005 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3797 LNCS; 155-168 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | Cryptanalysis of TOYOCRYPT-HS1 stream cipher | 1-Jan-2002 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E85-A(1); 66-73 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | Cryptography Policy of Japan and CRYPTREC | 2013 | BalkanCrypt 2013 | M31 |
Mihaljević, Miodrag J. ; Abe, Jouji | Data processing method | 2010 | | M91 |
Mihaljević, Miodrag J. ; Abe, Jouji | Data Processing Method, Program Thereof, Data Processor, and Receiver | 2010 | | M91 |
Mihaljević, Miodrag J. | Data Security for AI Systems Training Employing Advanced Blockchain Techniques - Invited talk | 2023 | International Conference on the Cooperation and Integration of Industry, Education, Research and Application (Data Science and Technology Session) | M32 |
Mihaljević, Miodrag J. ; Imai, Hideki | The decimated sample based improved algebraic attacks on the nonlinear filters | 1-Jan-2005 | Lecture Notes in Computer Science; 3352; 310-323 | M23 |
Mihaljević, Miodrag J. | Decimation Based Algebraic and Correlation Attacks and Design of Boolean Functions | 2008 | Boolean Functions in Cryptology and Information Security; 18; 183-199 | M14 |