Showing results 10 to 29 of 65
< previous
next >
Author(s) | Title | Issue Date | Appears in | Rank |
Imai, Hideki; Mihaljević, Miodrag J. ; Isaka, M.; Fossorier, Marc P. C. | Applications of iterative decoding techniques to cryptography | 2000 | 2nd Int. Symp. on Turbo Codes & Related Topics, Brest, France; 227-234 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | An approach for stream ciphers design based on joint computing over random and secret data | 1-Jun-2009 | Computing; 85(1-2); 153-168 | M22 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Birthday paradox based security analysis of certain broadcast encryption schemes | 1-Jan-2007 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E90-A(6); 1248-1251 | M23 |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A cellular automata based HB#-like low complexity authentication technique | 1-Dec-2008 | 2008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008 | |
Mihaljević, Miodrag J. ; Imai, Hideki | Construction of Fast MAC Based on Linear Cellular Automata over GF(q) | 1998 | ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 40-43 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | Contemporary Challenges of Cryptology for Cyber-Security | 2013 | WECT-INFOFEST 2013, WECT-INFOFEST 2013, Montenegro, 30. Sep - 05. Oct, 2013 | M32 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications | 1-Jan-1999 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1719; 282-293 | M21 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks | 1-Jan-2005 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3797 LNCS; 155-168 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | Cryptanalysis of TOYOCRYPT-HS1 stream cipher | 1-Jan-2002 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E85-A(1); 66-73 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | Cryptography Policy of Japan and CRYPTREC | 2013 | BalkanCrypt 2013 | M31 |
Mihaljević, Miodrag J. ; Imai, Hideki | The decimated sample based improved algebraic attacks on the nonlinear filters | 1-Jan-2005 | Lecture Notes in Computer Science; 3352; 310-323 | M23 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Decimation-based fast correlation attack | 1-Dec-2007 | IEEE International Symposium on Information Theory - Proceedings; 456-460 | |
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, Hideki | A family of fast dedicated one-way hash functions based on linear cellular automata over GF(qr) | 1-Jan-1999 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E82-A(1); 40-47 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | A family of fast keystream generators based on programmable linear cellular automata over GF (q) and time-variant table | 1-Jan-1999 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E82-A(1); 32-39 | M22 |
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, Hideki | Fast and secure stream cipher based on cellular automata over GF(q) | 1-Dec-1998 | Conference Record / IEEE Global Telecommunications Conference; 6; 3250-3255 | |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Fast correlation attack algorithm with list decoding and an application | 1-Jan-2002 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2355; 196-210 | M22 |
Mihaljević, Miodrag J. ; Imai, Hideki | Framework of a novel technique for algebraic and fast correlation attacks based on dedicated sample decimation | 2004 | The State of the Art of Stream Ciphers - SASC2004, Bruge, Belgium; 190-201 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3857 LNCS; 203-214 | M23 |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128 | 1-Oct-2012 | Periodica Mathematica Hungarica; 65(2); 205-227 | M23 |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | A generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916 | |