Advanced methods for cryptology and information processing


Project Acronym
PROJECT 144018
 
Project title
Advanced methods for cryptology and information processing
Project Coordinator
 
Start date
01-01-2006
Completion
31-12-2010
 

Publications
(All)



Results 1-20 of 46 (Search time: 0.001 seconds).

Author(s)TitleIssue DateAppears inRank
1Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 690-695
2Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiA generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916
3Mihaljević, Miodrag J. ; Imai, HidekiA security evaluation of certain stream ciphers which involve randomness and coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794
4Mihaljević, Miodrag J. ; Oggier, FrédériqueWire-tap Approach to enhance security in communication systems using the encoding-encryption paradigm19-Jul-2010ICT 2010: 2010 17th International Conference on Telecommunications, 4-7 April 2010; 83-88
5Bárány, Imre; Blagojević, Pavle ; Szucs, AndrásEquipartitioning by a convex 3-fan30-Jan-2010Advances in Mathematics; 223(2); 579-593M21a
6Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiTime-Memory and Time-Memory-Data Trade-Off for Noisy Ciphertext2010ECRYPT Workshop on Tools for Cryptanalysis 2010; 27-36M30
7Mihaljević, Miodrag J. ; Abe, JoujiData Processing Method, Program Thereof, Data Processor, and Receiver2010M91
8Mihaljević, Miodrag J. ; Abe, JoujiData processing method2010M91
9Blagojević, Pavle ; Ziegler, Günter M.Tetrahedra on deformed spheres and integral group cohomology10-Jun-2009Electronic Journal of Combinatorics; 16(2); 1-11M22
10Mihaljević, Miodrag J. ; Imai, HidekiAn approach for stream ciphers design based on joint computing over random and secret data1-Jun-2009Computing; 85(1-2); 153-168M22
11Blagojević, Pavle ; Vrećica, Siniša; Živaljević, Rade Computational topology of equivariant maps from spheres to complements of arrangements1-Feb-2009Transactions of the American Mathematical Society; 361(2); 1007-1038M21
12Lachlan, Michael; Mihaljević, Miodrag J. Wireless data communication method and apparatus for software download system2009M91
13Mihaljević, Miodrag J. A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding2009Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes; 23; 117-139M14
14Mihaljević, Miodrag J. ; Imai, HidekiA stream cipher design based on embedding of random bits1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008; International Symposium on Information Theory and its Applications, ISITA2008; Auckland; New Zealand; 7 December 2008 through 10 December 2008; 4895641M30
15Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA cellular automata based HB#-like low complexity authentication technique1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008
16Blagojević, Pavle ; Dimitrijević-Blagojević, Aleksandra ; McCleary, JohnEquilateral triangles on a Jordan curve and a generalization of a theorem of Dold1-Nov-2008Topology and its Applications; 156(1); 16-23M23
17Mihaljević, Miodrag J. ; Marković, Zoran ; Davidović, Tatjana Tehnički izveštaj o evaluaciji kriptografske sigurnosti određenih kriptografskih tehnika od perspektivnog interesa za GSM mrežu Mobilne telefonije, Telekoma Srbije2008M80
18Mihaljević, Miodrag J. Evaluacija sigurnosti određenih kriptografskih rešenja - Projekat razvoja i implementacije savremenog eletronskog registra u Republickoj direkciji za imovinu2008M80
19Mihaljević, Miodrag J. Decimation Based Algebraic and Correlation Attacks and Design of Boolean Functions2008Boolean Functions in Cryptology and Information Security; 18; 183-199M14
20Mihaljević, Miodrag J. Prikaz opšteg standardizovanog okvira za ostvarivanje informatičke bezbednosti Elektronskog Registra u njegovom integralnom okruženju - Projekat razvoja i implementacije savremenog eletronskog registra u Republičkoj direkciji za imovinu2008M80