Mihaljević, Miodrag J.
Loading...
3
0
20
0
false
Full Name
Mihaljević, Miodrag J.
ORCID
Scopus Author ID
Country
Serbia
Loading...
2
0
20
0
false
Subject
- 1 Algorithms | Communication channels (information theory) | Computational complexity | DecodingIterative methods | Spurious signal noise
- 1 Algorithms | Computational complexity | Correlation methods | Matrix algebra | Nonlinear filtering | Polynomials
- 1 Algorithms | Convergence | Cryptanalysis | Decoding | Fast correlation attack | Shift registers
- 1 Asynchronous consensus | Cross-chain | Data integrity | Data interaction | Relay network | Smart contract
- 1 Attacking scenarios | Authentication protocols | Computational capability | Cryptographic security | High performance computing | Implementation complexity | Learning parity with noise | Man in the middle
- 1 authentication protocol | HB | man-in-the-middle attack | cryptanalysis | performance | RFID
- 1 Authentification | Encryption | Security | Software defined radio
- 1 Binary erasure channel | Broadcasting | Conditional access control | Cryptographic key management
- 1 Binary sequence generators | Correlation attack | Cryptanalysis | Distance measures | MacLaren-Marsaglia shuffler
- 1 Binary sequence generators | Cryptanalysis | Cryptology | Registers | Selfshrinking generator | Shift
- < previous next >
Date issued
- 13 2020 - 2025
- 14 2010 - 2019
- 31 2000 - 2009
- 21 1990 - 1999
Type
- 79 Article
Results 61-79 of 79 (Search time: 0.005 seconds).
Author(s) | Title | Issue Date | Appears in | Rank | |
---|---|---|---|---|---|
61 | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications | 1-Jan-1999 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1719; 282-293 | M21 |
62 | Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, Hideki | A family of fast dedicated one-way hash functions based on linear cellular automata over GF(qr) | 1-Jan-1999 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E82-A(1); 40-47 | M23 |
63 | Mihaljević, Miodrag J. ; Stijović, D.; Marić, B.; Popadić, S.; Ivanović, M. | Koncept za uporedjivanje i uporedni pregled tri tehnike za za stitu informacionih sistema: Kerberos, SESAME i SSH | 1999 | Info-Science; 7(6); 8-13 | M50 |
64 | Mihaljević, Miodrag J. ; Imai, Hideki | A message authentication approach for for information systems | 1999 | Info-Science; 7(1); 4-7 | M50 |
65 | Mihaljević, Miodrag J. ; Stijović, D.; Marić, B.; Popadić, S.; Ivanović, M. | Elektronska trgovina, elektronski novac i kriptografske tehnike: Jedan osvrt na savremene trendove | 1999 | JISA-INFO; 1999(4); 31-34 | M50 |
66 | Mihaljević, Miodrag J. ; Zheng, Yuliang; Imal, Hideki | A cellular automaton based fast one-way hash function suitable for hardware implementation | 1-Jan-1998 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1431; 217-233 | M23 |
67 | Mihaljević, Miodrag J. | Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach | 1-Jan-1997 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1255; 250-262 | M23 |
68 | Mihaljević, Miodrag J. | An iterative probabilistic decoding algorithm for binary linear block codes beyond the half minimum distance | 1-Jan-1997 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1255; 237-249 | M23 |
69 | Mihaljević, Miodrag J. | An improved key stream generator based on the programmable cellular automata | 1997 | Lecture Notes in Computer Science; 1334; 181-191 | M23 |
70 | Mihaljević, Miodrag J. | A faster cryptanalysis of the self-shrinking generator | 1-Jan-1996 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1172; 182-189 | M23 |
71 | Mihaljević, Miodrag J. | A sequence comparison approach for decoding of general binary block code after the binary summetric channel with synchronization errors | 1-Jan-1996 | ZAMM Zeitschrift fur Angewandte Mathematik und Mechanik; 76; 479-480 | M23 |
72 | Mihaljević, Miodrag J. | A Correlation attack on the binary sequence generators with time-varying output function | 1-Jan-1995 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); International Conference on the Theory and Application of Cryptology, ASIACRYPT 1994: Advances in Cryptology — ASIACRYPT'94; Wollongong, Australia; November 28 – December 1, 1994; 917; 65-79 | M23 |
73 | Mihaljević, Miodrag J. | On message protection in cryptosystems modelled as the generalized wire-tap channel II | 1-Jan-1994 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 829 LNCS; 13-24 | M23 |
74 | Mihaljević, Miodrag J. ; Golić, Jovan Dj. | Convergence of a bayesian iterative error-correction procedure on a noisy shift register sequence | 24-May-1993 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 658 LNCS; 124-137 | M23 |
75 | Mihaljević, Miodrag J. | An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure | 1-Jan-1993 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 718 LNCS; 349-356 | M23 |
76 | Golić, Jovan Dj.; Mihaljević, Miodrag J. | A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance | 1-Jan-1991 | Journal of Cryptology; 3(3); 201-212 | M22 |
77 | Mihaljević, Miodrag J. ; Golić, Jovan Dj. | A comparison of cryptanalytic principles based on iterative error-correction | 1-Jan-1991 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 547 LNCS; 527-531 | M23 |
78 | Golić, Jovan Dj.; Mihaljević, Miodrag J. | Minimal linear equivalent analysis of a variable-memory binary sequence generator | 1-Jan-1990 | IEEE Transactions on Information Theory; 36(1); 190-192 | M21 |
79 | Mihaljević, Miodrag J. ; Golić, Jovan Dj. | A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence | 1-Jan-1990 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 453 LNCS; 165-175 | M23 |
Results 1-6 of 6 (Search time: 0.0 seconds).
Acronym | Title | Start date | Completion | P-Investigator |
---|---|---|---|---|
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books | 01-07-2020 | 30-06-2022 | Mihaljević, Miodrag J. | |
PROJECT 0274 | A Software System For Cryptographic Protection of the Electronic Archives | 01-01-2002 | 31-12-2004 | Mihaljević, Miodrag J. |
PROJECT 1625 | Advanced Mathematical Methods for Cryptographic Security and Modelling of Information | 01-01-2002 | 31-12-2005 | Mihaljević, Miodrag J. |
PROJECT 144018 | Advanced methods for cryptology and information processing | 01-01-2006 | 31-12-2010 | Mihaljević, Miodrag J. |
PROJECT 174008 | Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security | 01-01-2011 | 31-12-2019 | Mihaljević, Miodrag J. |
PROJECT 04M02 | Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science | 01-01-1996 | 31-12-2000 | Mihaljević, Miodrag J. |