Mihaljević, Miodrag J.
Loading...
3
0
20
0
false
Full Name
Mihaljević, Miodrag J.
ORCID
Scopus Author ID
Country
Serbia
Loading...
2
0
20
0
false
Subject
- 1 Algebra | Cryptography | Information theory | Spectroscopy
- 1 Algebraic representations | Error correction coding | Exhaustive search | Pseudorandomness | Secret key | Security evaluation | Stream Ciphers
- 1 Algorithms | Bit error rate | Cryptography | Decoding | Linear equations | Matrix algebra | Polynomials | Probability density function | Vectors
- 1 AMI | Authentication | Cryptography | Encryption | Key Management | Smart Grid
- 1 Authentication | Information theory | Network protocols | Number theory | Random processes | Spectroscopy
- 1 Automata theory | Cryptography | Security of data
- 1 Binary sequences | Correlation theory | Data processing | Polynomials | Probability | Security of data | Statistical tests
- 1 Binary symmetric channel | Ciphertexts | Encryption schemes | Insertion errors | Light weight | Random bits | Secret key | Security enhancements
- 1 Blockchain | data authenticity | data integrity | medical data reliable processing
- 1 Codes (symbols) | Computational complexity | Correlation methods | Decoding
- next >
Date issued
- 15 2020 - 2024
- 37 2010 - 2019
- 23 2000 - 2009
- 6 1990 - 1999
Type
Results 41-60 of 81 (Search time: 0.003 seconds).
Author(s) | Title | Issue Date | Appears in | Rank | |
---|---|---|---|---|---|
41 | Mihaljević, Miodrag J. | On Certain Problems of Cryptology and Computational Complexity of Processing over Uncertain Data | 2013 | Logic and Applications - LAP 2013 | M34 |
42 | Mihaljević, Miodrag J. ; Imai, Hideki | Contemporary Challenges of Cryptology for Cyber-Security | 2013 | WECT-INFOFEST 2013, WECT-INFOFEST 2013, Montenegro, 30. Sep - 05. Oct, 2013 | M32 |
43 | Mihaljević, Miodrag J. | An approach for light-weight encryption employing dedicated coding | 1-Dec-2012 | GLOBECOM - IEEE Global Telecommunications Conference; IEEE Global Communications Conference, GLOBECOM 2012; Anaheim, CA; United States; 3 December 2012 through 7 December 2012; 874-880 | |
44 | Mihaljević, Miodrag J. ; Imai, Hideki; David, Michael; Kobara, Kazukuni; Watanabe, Hajime | On advanced cryptographic techniques for information security of smart grid AMI | 1-Dec-2011 | ACM International Conference Proceeding Series; 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11; Oak Ridge, TN; United States; 12 October 2011 through 14 October 2011 | |
45 | Mihaljević, Miodrag J. ; Gangopadhyay, S.; Paul, G.; Imai, H. | An Algorithm for the Internal State Recoverz of Grain-v1 | 2011 | Record of the 11th Central European Conference on Cryptology, Hungary, 30. Jun - 02. Jul, 2011; 1-14 | M33 |
46 | Mihaljević, Miodrag J. ; Imai, Hideki | On Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem | 2011 | 2011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark; 1-17 | M30 |
47 | Mihaljević, Miodrag J. ; Imai, Hideki | An Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Mode | 2011 | 4th Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, Germany; 21-25 | M30 |
48 | Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 690-695 | |
49 | Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | A generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916 | |
50 | Mihaljević, Miodrag J. ; Imai, Hideki | A security evaluation of certain stream ciphers which involve randomness and coding | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794 | |
51 | Mihaljević, Miodrag J. ; Oggier, Frédérique | Wire-tap Approach to enhance security in communication systems using the encoding-encryption paradigm | 19-Jul-2010 | ICT 2010: 2010 17th International Conference on Telecommunications, 4-7 April 2010; 83-88 | |
52 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Time-Memory and Time-Memory-Data Trade-Off for Noisy Ciphertext | 2010 | ECRYPT Workshop on Tools for Cryptanalysis 2010; 27-36 | M30 |
53 | Mihaljević, Miodrag J. ; Imai, Hideki | A stream cipher design based on embedding of random bits | 1-Dec-2008 | 2008 International Symposium on Information Theory and its Applications, ISITA2008; International Symposium on Information Theory and its Applications, ISITA2008; Auckland; New Zealand; 7 December 2008 through 10 December 2008; 4895641 | M30 |
54 | Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A cellular automata based HB#-like low complexity authentication technique | 1-Dec-2008 | 2008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008 | |
55 | Mihaljević, Miodrag J. ; Imai, Hideki | A Stream Ciphering Approach Based on the Wire-Tap Channel Coding | 2008 | 8th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18 | M30 |
56 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Decimation-based fast correlation attack | 1-Dec-2007 | IEEE International Symposium on Information Theory - Proceedings; 456-460 | |
57 | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129 | M30 |
58 | Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100 | M30 |
59 | Mihaljević, Miodrag J. ; Imai, Hideki | Novel method for implementation of certain key management schemes to minimize secret storage | 1-Jan-2005 | 2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; 2005; 54-59 | |
60 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | A unified analysis for the fast correlation attack | 1-Jan-2005 | IEEE International Symposium on Information Theory - Proceedings; 2005; 2012-2015 |
Results 1-6 of 6 (Search time: 0.0 seconds).
Acronym | Title | Start date | Completion | P-Investigator |
---|---|---|---|---|
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books | 01-07-2020 | 30-06-2022 | Mihaljević, Miodrag J. | |
PROJECT 0274 | A Software System For Cryptographic Protection of the Electronic Archives | 01-01-2002 | 31-12-2004 | Mihaljević, Miodrag J. |
PROJECT 1625 | Advanced Mathematical Methods for Cryptographic Security and Modelling of Information | 01-01-2002 | 31-12-2005 | Mihaljević, Miodrag J. |
PROJECT 144018 | Advanced methods for cryptology and information processing | 01-01-2006 | 31-12-2010 | Mihaljević, Miodrag J. |
PROJECT 174008 | Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security | 01-01-2011 | 31-12-2019 | Mihaljević, Miodrag J. |
PROJECT 04M02 | Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science | 01-01-1996 | 31-12-2000 | Mihaljević, Miodrag J. |