Showing results 29 to 48 of 65
< previous
next >
Author(s) | Title | Issue Date | Appears in | Rank |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | A generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916 | |
Wang, Jian; Mihaljević, Miodrag J. ; Harn, Lein; Imai, Hideki | A hierarchical key management approach for secure multicast | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3894 LNCS; 422-434 | M23 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | An improved fast correlation attack based on list decoding | 1-Jan-2003 | IEEE International Symposium on Information Theory - Proceedings; 165 | |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | Internal state recovery of Grain-v1 employing normality order of the filter function | 1-Jun-2012 | IET Information Security; 6(2); 55-64 | M23 |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function | 15-Nov-2012 | Information Processing Letters; 112(21); 805-810 | M23 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Key management with minimized secret storage employing an erasure channel approach | 1-Jan-2005 | IEEE Communications Letters; 9(8); 741-743 | M21 |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 690-695 | |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A Low-Complexity and High-Performance algorithm for the fast correlation attack | 1-Jan-2001 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1978; 196-212 | M21 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Modeling block decoding approaches for the fast correlation attack | 1-Dec-2007 | IEEE Transactions on Information Theory; 53(12); 4728-4737 | M21a |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A novel broadcast encryption based on time-bound cryptographic keys | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); International Conference on Digital Rights Management, DRMTICS 2005 : Digital Rights Management. Technologies, Issues, Challenges and Systems; Sydney, Australia; October 31 - November 2, 2005; 3919 LNCS; 258-276 | M23 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Novel fast correlation attacks via iterative decoding of punctured simplex codes | 1-Jan-2000 | IEEE International Symposium on Information Theory - Proceedings; 214 | M33 |
Mihaljević, Miodrag J. ; Imai, Hideki | Novel method for implementation of certain key management schemes to minimize secret storage | 1-Jan-2005 | 2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; 2005; 54-59 | |
Mihaljević, Miodrag J. ; Imai, Hideki; David, Michael; Kobara, Kazukuni; Watanabe, Hajime | On advanced cryptographic techniques for information security of smart grid AMI | 1-Dec-2011 | ACM International Conference Proceeding Series; 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11; Oak Ridge, TN; United States; 12 October 2011 through 14 October 2011 | |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | On decoding techniques for cryptanalysis of certain encryption algorithms | 1-Jan-2001 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E84-A(4); 919-930 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | On employment of different weight parity-checks for the fast correlation attack | 1-Jan-2001 | IEEE International Symposium on Information Theory - Proceedings; IEEE International Symposium on Information Theory (ISIT 2001); Washington, DC; United States; 24 June 2001 through 29 June 2001; 119 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | On Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem | 2011 | 2011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark; 1-17 | M30 |
Camion, Paul; Mihaljević, Miodrag J. ; Imai, Hideki | On employment of LFSRs over GF(q) in certain stream ciphers | 1-Jan-2002 | IEEE International Symposium on Information Theory - Proceedings; 210 | |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | One-way mapping of keys and the overheads trade-off in key management schemes for broadcast encryption | 2004 | Int. Symp. Inform. Theory and its Appl. - ISITA2004, Parma, Italy; 486-491 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | Privacy Preserving Light-Weight Authentication Based on a Variant of Niederreiter Public-Key Encryption | 2015 | The IPSI BgD Transactions on Advanced Research; 11(1); 6-12 | M53 |