The SCEAS System
| |||||||

## Search the dblp DataBase
Miodrag J. Mihaljevic:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai
**Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications.**[Citation Graph (0, 0)][DBLP] AAECC, 1999, pp:282-293 [Conf] - Miodrag J. Mihaljevic
**An Iterative Probabilistic Decoding Algorithm for Binary Linear Block Codes Beyond the Half Minimum Distance.**[Citation Graph (0, 0)][DBLP] AAECC, 1997, pp:237-249 [Conf] - Miodrag J. Mihaljevic
**Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach.**[Citation Graph (0, 0)][DBLP] AAECC, 1997, pp:250-262 [Conf] - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
**A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation.**[Citation Graph (0, 0)][DBLP] AAECC, 2006, pp:203-214 [Conf] - Miodrag J. Mihaljevic
**A faster cryptanalysis of the self-shrinking generator.**[Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:182-189 [Conf] - Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai
**A Hierarchical Key Management Approach for Secure Multicast.**[Citation Graph (0, 0)][DBLP] ARCS, 2006, pp:422-434 [Conf] - Miodrag J. Mihaljevic
**A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1994, pp:67-79 [Conf] - Miodrag J. Mihaljevic
**Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2003, pp:137-154 [Conf] - Miodrag J. Mihaljevic
**An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:349-356 [Conf] - Miodrag J. Mihaljevic, Jovan Dj. Golic
**A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence.**[Citation Graph (0, 0)][DBLP] AUSCRYPT, 1990, pp:165-175 [Conf] - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
**Security Weaknesses of Certain Broadcast Encryption Schemes.**[Citation Graph (0, 0)][DBLP] DRMTICS, 2005, pp:228-245 [Conf] - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
**A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys.**[Citation Graph (0, 0)][DBLP] DRMTICS, 2005, pp:258-276 [Conf] - Miodrag J. Mihaljevic
**On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II.**[Citation Graph (0, 0)][DBLP] Error Control, Cryptology, and Speech Compression, 1993, pp:13-24 [Conf] - Jovan Dj. Golic, Miodrag J. Mihaljevic
**A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1990, pp:487-491 [Conf] - Miodrag J. Mihaljevic, Jovan Dj. Golic
**A Comparison of Cryptoanalytic Principles Based on Iterative Error-Correction.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1991, pp:527-531 [Conf] - Miodrag J. Mihaljevic, Jovan Dj. Golic
**Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1992, pp:124-137 [Conf] - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
**A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack.**[Citation Graph (0, 0)][DBLP] FSE, 2000, pp:196-212 [Conf] - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
**Fast Correlation Attack Algorithm with List Decoding and an Application.**[Citation Graph (0, 0)][DBLP] FSE, 2001, pp:196-210 [Conf] - Miodrag J. Mihaljevic
**Broadcast Encryption Schemes Based on the Sectioned Key Tree.**[Citation Graph (0, 0)][DBLP] ICICS, 2003, pp:158-169 [Conf] - Miodrag J. Mihaljevic
**An improved key stream generator based on the programmable cellular automata.**[Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:181-191 [Conf] - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
**Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.**[Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:375-387 [Conf] - Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
**An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:48-62 [Conf] - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
**Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:155-168 [Conf] - Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
**A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:217-233 [Conf] - Paul Camion, Miodrag J. Mihaljevic, Hideki Imai
**Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2002, pp:196-213 [Conf] - Miodrag J. Mihaljevic, Hideki Imai
**The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters.**[Citation Graph (0, 0)][DBLP] SCN, 2004, pp:310-323 [Conf] - Jovan Dj. Golic, Miodrag J. Mihaljevic
**A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 1991, v:3, n:3, pp:201-212 [Journal] - Jovan Dj. Golic, Miodrag J. Mihaljevic
**Minimal linear equivalent analysis of a variable-memory binary sequence generator.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1990, v:36, n:1, pp:190-0 [Journal] - Miodrag J. Mihaljevic, Jovan Dj. Golic
**A method for convergence analysis of iterative probabilistic decoding.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:6, pp:2206-2211 [Journal] **An approach for stream ciphers design based on joint computing over random and secret data.**[Citation Graph (, )][DBLP]**An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm**[Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |