Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security


Project Acronym
PROJECT 174008
 
Project title
Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security
Project Coordinator
 
Start date
01-01-2011
Completion
31-12-2019
 
Funding Program
Directorate for Education & Human Resources
 
OA Mandate
 
Currency
EUR
 

Publications
(All)



Results 81-97 of 97 (Search time: 0.025 seconds).

Author(s)TitleIssue DateAppears inRank
81Mihaljević, Miodrag J. An approach for light-weight encryption employing dedicated coding1-Dec-2012GLOBECOM - IEEE Global Telecommunications Conference; IEEE Global Communications Conference, GLOBECOM 2012; Anaheim, CA; United States; 3 December 2012 through 7 December 2012; 874-880
82Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiInternal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function15-Nov-2012Information Processing Letters; 112(21); 805-810M23
83Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiGeneric cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-1281-Oct-2012Periodica Mathematica Hungarica; 65(2); 205-227M23
84Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiInternal state recovery of Grain-v1 employing normality order of the filter function1-Jun-2012IET Information Security; 6(2); 55-64M23
85Mihaljević, Miodrag J. On Certain Approaches for Analysis and Design of Cryptographic Techniques for Symmetric Encryption and Key Management2012Selected Topics of Image Processing and Cryptology; 15; 119-186M14
86SELECTED TOPICS ON IMAGE PROCESSING AND CRYPTOLOGY201215(23)M18
87Mihaljević, Miodrag J. On Certain Coding Approaches for Security Evaluation and Design of Stream Ciphers2012The IPSI BgD Transactions on Advanced Research; 8(2); 28-34M53
88Mihaljević, Miodrag J. ; Imai, Hideki; David, Michael; Kobara, Kazukuni; Watanabe, HajimeOn advanced cryptographic techniques for information security of smart grid AMI1-Dec-2011ACM International Conference Proceeding Series; 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11; Oak Ridge, TN; United States; 12 October 2011 through 14 October 2011
89Blagojević, Pavle ; Dimitrijević-Blagojević, Aleksandra ; McCleary, JohnSpectral sequences in combinatorial geometry: Cheeses, inscribed sets, and Borsuk-Ulam type theorems15-Sep-2011Topology and its Applications; 158(15); 1920-1936M23
90Blagojević, Pavle ; Matschke, Benjamin; Ziegler, GünterA tight colored Tverberg theorem for maps to manifolds1-Aug-2011Topology and its Applications; 158(12); 1445-1452M23
91Blagojević, Pavle ; Ziegler, GünterThe ideal-valued index for a dihedral group action, and mass partition by two hyperplanes1-Aug-2011Topology and its Applications; 158(12); 1326-1351M23
92Blagojević, Pavle ; Matschke, Benjamin; Ziegler, GünterOptimal bounds for a colorful Tverberg-Vrećica type problem1-Apr-2011Advances in Mathematics; 226(6); 5198-5215M21a
93Mihaljević, Miodrag J. ; Gangopadhyay, S.; Paul, G.; Imai, H.An Algorithm for the Internal State Recoverz of Grain-v12011Record of the 11th Central European Conference on Cryptology, Hungary, 30. Jun - 02. Jul, 2011; 1-14M33
94Mihaljević, Miodrag J. ; Imai, HidekiOn Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem20112011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark; 1-17M30
95Mihaljević, Miodrag J. ; Abe, JoujiMethod and apparatus for cellular automata based generation of pseudorandom sequences with controllable period2011M91
96Mihaljević, Miodrag J. ; Watanabe, HajimeAuthentication system using light-weight authentication protocol2011M91
97Mihaljević, Miodrag J. ; Imai, HidekiAn Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Mode20114th Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, Germany; 21-25M30