Search the dblp DataBase
Miodrag J. Mihaljevic :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Marc P. C. Fossorier , Miodrag J. Mihaljevic , Hideki Imai Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications. [Citation Graph (0, 0)][DBLP ] AAECC, 1999, pp:282-293 [Conf ] Miodrag J. Mihaljevic An Iterative Probabilistic Decoding Algorithm for Binary Linear Block Codes Beyond the Half Minimum Distance. [Citation Graph (0, 0)][DBLP ] AAECC, 1997, pp:237-249 [Conf ] Miodrag J. Mihaljevic Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach. [Citation Graph (0, 0)][DBLP ] AAECC, 1997, pp:250-262 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:203-214 [Conf ] Miodrag J. Mihaljevic A faster cryptanalysis of the self-shrinking generator. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:182-189 [Conf ] Jian Wang , Miodrag J. Mihaljevic , Lein Harn , Hideki Imai A Hierarchical Key Management Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP ] ARCS, 2006, pp:422-434 [Conf ] Miodrag J. Mihaljevic A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:67-79 [Conf ] Miodrag J. Mihaljevic Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:137-154 [Conf ] Miodrag J. Mihaljevic An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:349-356 [Conf ] Miodrag J. Mihaljevic , Jovan Dj. Golic A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:165-175 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai Security Weaknesses of Certain Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:228-245 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:258-276 [Conf ] Miodrag J. Mihaljevic On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II. [Citation Graph (0, 0)][DBLP ] Error Control, Cryptology, and Speech Compression, 1993, pp:13-24 [Conf ] Jovan Dj. Golic , Miodrag J. Mihaljevic A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:487-491 [Conf ] Miodrag J. Mihaljevic , Jovan Dj. Golic A Comparison of Cryptoanalytic Principles Based on Iterative Error-Correction. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:527-531 [Conf ] Miodrag J. Mihaljevic , Jovan Dj. Golic Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:124-137 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:196-212 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai Fast Correlation Attack Algorithm with List Decoding and an Application. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:196-210 [Conf ] Miodrag J. Mihaljevic Broadcast Encryption Schemes Based on the Sectioned Key Tree. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:158-169 [Conf ] Miodrag J. Mihaljevic An improved key stream generator based on the programmable cellular automata. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:181-191 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:375-387 [Conf ] Marc P. C. Fossorier , Miodrag J. Mihaljevic , Hideki Imai , Yang Cui , Kanta Matsuura An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:48-62 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:155-168 [Conf ] Miodrag J. Mihaljevic , Yuliang Zheng , Hideki Imai A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1998, pp:217-233 [Conf ] Paul Camion , Miodrag J. Mihaljevic , Hideki Imai Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:196-213 [Conf ] Miodrag J. Mihaljevic , Hideki Imai The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:310-323 [Conf ] Jovan Dj. Golic , Miodrag J. Mihaljevic A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1991, v:3, n:3, pp:201-212 [Journal ] Jovan Dj. Golic , Miodrag J. Mihaljevic Minimal linear equivalent analysis of a variable-memory binary sequence generator. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:1, pp:190-0 [Journal ] Miodrag J. Mihaljevic , Jovan Dj. Golic A method for convergence analysis of iterative probabilistic decoding. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:6, pp:2206-2211 [Journal ] An approach for stream ciphers design based on joint computing over random and secret data. [Citation Graph (, )][DBLP ] An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs