The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Miodrag J. Mihaljevic: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai
    Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:282-293 [Conf]
  2. Miodrag J. Mihaljevic
    An Iterative Probabilistic Decoding Algorithm for Binary Linear Block Codes Beyond the Half Minimum Distance. [Citation Graph (0, 0)][DBLP]
    AAECC, 1997, pp:237-249 [Conf]
  3. Miodrag J. Mihaljevic
    Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach. [Citation Graph (0, 0)][DBLP]
    AAECC, 1997, pp:250-262 [Conf]
  4. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:203-214 [Conf]
  5. Miodrag J. Mihaljevic
    A faster cryptanalysis of the self-shrinking generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:182-189 [Conf]
  6. Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai
    A Hierarchical Key Management Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    ARCS, 2006, pp:422-434 [Conf]
  7. Miodrag J. Mihaljevic
    A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:67-79 [Conf]
  8. Miodrag J. Mihaljevic
    Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:137-154 [Conf]
  9. Miodrag J. Mihaljevic
    An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:349-356 [Conf]
  10. Miodrag J. Mihaljevic, Jovan Dj. Golic
    A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:165-175 [Conf]
  11. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Security Weaknesses of Certain Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:228-245 [Conf]
  12. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:258-276 [Conf]
  13. Miodrag J. Mihaljevic
    On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II. [Citation Graph (0, 0)][DBLP]
    Error Control, Cryptology, and Speech Compression, 1993, pp:13-24 [Conf]
  14. Jovan Dj. Golic, Miodrag J. Mihaljevic
    A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:487-491 [Conf]
  15. Miodrag J. Mihaljevic, Jovan Dj. Golic
    A Comparison of Cryptoanalytic Principles Based on Iterative Error-Correction. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:527-531 [Conf]
  16. Miodrag J. Mihaljevic, Jovan Dj. Golic
    Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:124-137 [Conf]
  17. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:196-212 [Conf]
  18. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Fast Correlation Attack Algorithm with List Decoding and an Application. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:196-210 [Conf]
  19. Miodrag J. Mihaljevic
    Broadcast Encryption Schemes Based on the Sectioned Key Tree. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:158-169 [Conf]
  20. Miodrag J. Mihaljevic
    An improved key stream generator based on the programmable cellular automata. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:181-191 [Conf]
  21. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:375-387 [Conf]
  22. Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
    An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:48-62 [Conf]
  23. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:155-168 [Conf]
  24. Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
    A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:217-233 [Conf]
  25. Paul Camion, Miodrag J. Mihaljevic, Hideki Imai
    Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:196-213 [Conf]
  26. Miodrag J. Mihaljevic, Hideki Imai
    The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:310-323 [Conf]
  27. Jovan Dj. Golic, Miodrag J. Mihaljevic
    A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1991, v:3, n:3, pp:201-212 [Journal]
  28. Jovan Dj. Golic, Miodrag J. Mihaljevic
    Minimal linear equivalent analysis of a variable-memory binary sequence generator. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:1, pp:190-0 [Journal]
  29. Miodrag J. Mihaljevic, Jovan Dj. Golic
    A method for convergence analysis of iterative probabilistic decoding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:6, pp:2206-2211 [Journal]

  30. An approach for stream ciphers design based on joint computing over random and secret data. [Citation Graph (, )][DBLP]


  31. An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002