Showing results 1 to 20 of 65
next >
Author(s) | Title | Issue Date | Appears in | Rank |
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, Hideki | A Fast Cryptographic Hash Function Based on Cellular Automata over GF(q) | 1998 | Global IT Security, IFIP (14th IFIP Int. Conf. on Information Security at 15th World Comput. Congress - IFIP/SEC '98, Vienna - Budapest); 96-107 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | A message authentication approach for for information systems | 1999 | Info-Science; 7(1); 4-7 | M50 |
Mihaljević, Miodrag J. ; Imai, Hideki | A method for data access control in certain storage area networks | 2004 | 7th Int. Symp. on Wireless Personal Multimedia Comm. - WPMC2004, Albano Terme, Italy; 3; 488-491 | M30 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys | 2005 | HISC 2005 - Hawaii, IEICE and SITA Joint Conference on Information Theory, Hawaii, USA; 183-188 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A novel fast correlation attack suitable for simple hardware implementation | 2000 | Technical report of IEICE. ISEC; JW-ISC'2000, Okinawa, Japan; 99(584); 1-8 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A time-memory trade-off for the fast correlation attack | 2000 | ISITA2000, Hawaii, USA; 55-58 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P.C.; Imai, Hideki | An algorithm for cryptanalysis of certain keystream generators suitable for high-speed software and hardware implementations | 1-Jan-2001 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E84-A(1); 311-318 | M23 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki; Cui, Yang; Matsuura, Kanta | An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 4329 LNCS; 48-62 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | An Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Mode | 2011 | 4th Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, Germany; 21-25 | M30 |
Imai, Hideki; Mihaljević, Miodrag J. ; Isaka, M.; Fossorier, Marc P. C. | Applications of iterative decoding techniques to cryptography | 2000 | 2nd Int. Symp. on Turbo Codes & Related Topics, Brest, France; 227-234 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | An approach for stream ciphers design based on joint computing over random and secret data | 1-Jun-2009 | Computing; 85(1-2); 153-168 | M22 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Birthday paradox based security analysis of certain broadcast encryption schemes | 1-Jan-2007 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E90-A(6); 1248-1251 | M23 |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A cellular automata based HB#-like low complexity authentication technique | 1-Dec-2008 | 2008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008 | |
Mihaljević, Miodrag J. ; Imai, Hideki | Construction of Fast MAC Based on Linear Cellular Automata over GF(q) | 1998 | ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 40-43 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | Contemporary Challenges of Cryptology for Cyber-Security | 2013 | WECT-INFOFEST 2013, WECT-INFOFEST 2013, Montenegro, 30. Sep - 05. Oct, 2013 | M32 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications | 1-Jan-1999 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1719; 282-293 | M21 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks | 1-Jan-2005 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3797 LNCS; 155-168 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | Cryptanalysis of TOYOCRYPT-HS1 stream cipher | 1-Jan-2002 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E85-A(1); 66-73 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | Cryptography Policy of Japan and CRYPTREC | 2013 | BalkanCrypt 2013 | M31 |
Mihaljević, Miodrag J. ; Imai, Hideki | The decimated sample based improved algebraic attacks on the nonlinear filters | 1-Jan-2005 | Lecture Notes in Computer Science; 3352; 310-323 | M23 |