The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jovan Dj. Golic: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson
    The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:25-39 [Conf]
  2. Jovan Dj. Golic
    Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:220-233 [Conf]
  3. Jovan Dj. Golic
    On period of multiplexed sequences. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:158-168 [Conf]
  4. Jovan Dj. Golic
    Edit distance correlation attacks on clock-controlled combiners with memory. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:169-181 [Conf]
  5. Jovan Dj. Golic, Andrew Clark, Ed Dawson
    Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:88-102 [Conf]
  6. Jovan Dj. Golic, Renato Menicocci
    Correlation Attacks on Up/Down Cascades. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:123-134 [Conf]
  7. M. Salmasidazeh, Leone Simpson, Jovan Dj. Golic, Ed Dawson
    Fast Correlation Attacks and Multiple Linear Approximations. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:228-239 [Conf]
  8. Leone Simpson, Jovan Dj. Golic, Ed Dawson
    A Probabilistic Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:147-158 [Conf]
  9. Jovan Dj. Golic
    Intrinsic Statistical Weakness of Keystream Generators. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:91-103 [Conf]
  10. Luke O'Connor, Jovan Dj. Golic
    A Unified Markow Approach to Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:387-397 [Conf]
  11. Miodrag J. Mihaljevic, Jovan Dj. Golic
    A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:165-175 [Conf]
  12. Jovan Dj. Golic
    DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:98-112 [Conf]
  13. Jovan Dj. Golic, Christophe Tymen
    Multiplicative Masking and Power Analysis of AES. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:198-212 [Conf]
  14. Jovan Dj. Golic
    A Note on Nonuniform Decimation of Periodic Sequences. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:125-131 [Conf]
  15. Jovan Dj. Golic, Luke O'Connor
    A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:174-185 [Conf]
  16. Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson
    Discrete Optimisation and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:186-200 [Conf]
  17. Helen Gustafson, Ed Dawson, Jovan Dj. Golic
    Randomness Measures Related to Subset Occurrence. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:132-143 [Conf]
  18. Jovan Dj. Golic
    Correlation Analysis of the Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:440-457 [Conf]
  19. Jovan Dj. Golic, Renato Menicocci
    Edit Distance Correlation Attack on the Alternating Step Generator. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:499-512 [Conf]
  20. Jovan Dj. Golic
    Linear Statistical Weakness of Alleged RC4 Keystream Generator. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:226-238 [Conf]
  21. Jovan Dj. Golic
    Cryptanalysis of Alleged A5 Stream Cipher. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:239-255 [Conf]
  22. Jovan Dj. Golic
    The Number of Output Sequences of a Binary Sequence Generator. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:160-167 [Conf]
  23. Jovan Dj. Golic
    Correlation via Linear Sequential Circuit Approximation of Combiners with memory. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:113-123 [Conf]
  24. Jovan Dj. Golic
    Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:248-262 [Conf]
  25. Jovan Dj. Golic
    Fast Low Order Approximation of Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:268-282 [Conf]
  26. Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari
    Linear Cryptanalysis of Bluetooth Stream Cipher. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:238-255 [Conf]
  27. Jovan Dj. Golic, Miodrag J. Mihaljevic
    A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:487-491 [Conf]
  28. Jovan Dj. Golic, Luke O'Connor
    Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:230-243 [Conf]
  29. Jovan Dj. Golic, Slobodan V. Petrovic
    A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:472-476 [Conf]
  30. Miodrag J. Mihaljevic, Jovan Dj. Golic
    A Comparison of Cryptoanalytic Principles Based on Iterative Error-Correction. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:527-531 [Conf]
  31. Miodrag J. Mihaljevic, Jovan Dj. Golic
    Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:124-137 [Conf]
  32. Andrew Clark, Jovan Dj. Golic, Ed Dawson
    A Comparison of Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:145-157 [Conf]
  33. Jovan Dj. Golic
    A Weakness of the Linear Part of Stream Cipher MUGI. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:178-192 [Conf]
  34. Jovan Dj. Golic
    On the Security of Shift Register Based Keystream Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:90-100 [Conf]
  35. Jovan Dj. Golic
    Linear Cryptanalysis of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:154-169 [Conf]
  36. Jovan Dj. Golic
    On the Security of Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:173-188 [Conf]
  37. Jovan Dj. Golic, Guglielmo Morgari
    On the Resynchronization Attack. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:100-110 [Conf]
  38. Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic
    Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:210-228 [Conf]
  39. Renato Menicocci, Jovan Dj. Golic
    Edit Probability Correlation Attack on the Bilateral Stop/Go Generator. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:201-212 [Conf]
  40. Jovan Dj. Golic
    Modes of Operation of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:233-247 [Conf]
  41. Jovan Dj. Golic
    On the Success of the Embedding Attack on the Alternating Step Generator. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:262-274 [Conf]
  42. Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan
    LILI Keystream Generator. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:248-261 [Conf]
  43. Jovan Dj. Golic, Andrew Clark, Ed Dawson
    Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1999, v:31, n:2, pp:44-53 [Journal]
  44. Jovan Dj. Golic
    How to Construct Cryptographic Primitives from Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:1, pp:79-89 [Journal]
  45. Jovan Dj. Golic, Philip Hawkes
    Vectorial Approach to Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:1, pp:5-19 [Journal]
  46. Jovan Dj. Golic, Renato Menicocci
    Correlation Analysis of the Alternating Step Generator. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:31, n:1, pp:51-74 [Journal]
  47. Jovan Dj. Golic
    A probabilistic cryptanalytic method for a time-variant permutation generator. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:80, n:2, pp:67-73 [Journal]
  48. Jovan Dj. Golic
    Stream Cipher Encryption of Random Access Files. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:69, n:3, pp:145-148 [Journal]
  49. Jovan Dj. Golic, Mahmoud Salmasizadeh, Leone Simpson, Ed Dawson
    Fast Correlation Attacks on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:64, n:1, pp:37-42 [Journal]
  50. Leone Simpson, Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson
    A Fast Correlation Attack on Multiplexer Generators. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:70, n:2, pp:89-93 [Journal]
  51. Jovan Dj. Golic, Slobodan V. Petrovic
    Constrained Many-to-One String Editing with Memory. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1995, v:86, n:1-3, pp:61-76 [Journal]
  52. Slobodan V. Petrovic, Jovan Dj. Golic
    String editing under a combination of constraints. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1993, v:74, n:1-2, pp:151-163 [Journal]
  53. Jovan Dj. Golic, Renato Menicocci
    Computation of Edit Probabilities and Edit Distances for the A5-Type Keystream Generator. [Citation Graph (0, 0)][DBLP]
    J. Complexity, 2002, v:18, n:1, pp:356-374 [Journal]
  54. Jovan Dj. Golic
    Correlation Properties of a General Binary Combiner with Memory. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1996, v:9, n:2, pp:111-126 [Journal]
  55. Jovan Dj. Golic
    On Matroid Characterization of Ideal Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1998, v:11, n:2, pp:75-86 [Journal]
  56. Jovan Dj. Golic, Renato Menicocci
    Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2003, v:16, n:1, pp:41-68 [Journal]
  57. Jovan Dj. Golic, Miodrag J. Mihaljevic
    A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1991, v:3, n:3, pp:201-212 [Journal]
  58. Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson
    Fast Correlation Attacks on the Summation Generator. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:2, pp:245-262 [Journal]
  59. Jovan Dj. Golic
    Constrained Embedding Probability for Two Binary Strings. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 1996, v:9, n:3, pp:360-364 [Journal]
  60. Jovan Dj. Golic
    New Methods for Digital Generation and Postprocessing of Random Data. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:10, pp:1217-1229 [Journal]
  61. Jovan Dj. Golic
    Linear Models for Keystream Generators. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1996, v:45, n:1, pp:41-49 [Journal]
  62. Jovan Dj. Golic, Andrew Clark, Ed Dawson
    Generalized Inversion Attack on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2000, v:49, n:10, pp:1100-1109 [Journal]
  63. Jovan Dj. Golic, Slobodan V. Petrovic
    Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1996, v:45, n:4, pp:482-486 [Journal]
  64. Jovan Dj. Golic
    Cryptanalysis of three mutually clock-controlled stop/go shift registers. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:1081-1090 [Journal]
  65. Jovan Dj. Golic
    Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:3, pp:1032-1041 [Journal]
  66. Jovan Dj. Golic
    Iterative optimum symbol-by-symbol decoding and fast correlation attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:7, pp:3040-3049 [Journal]
  67. Jovan Dj. Golic
    Embedding probabilities for the Alternating Step Generator. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:7, pp:2543-2553 [Journal]
  68. Jovan Dj. Golic
    Vectorial Boolean functions and induced algebraic equations. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:2, pp:528-537 [Journal]
  69. Jovan Dj. Golic
    On the relationship between the efficiency measures of multicategory information systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:4, pp:531-538 [Journal]
  70. Jovan Dj. Golic
    On the relationship between the information measures and the Bayes probability of error. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:5, pp:681-693 [Journal]
  71. Jovan Dj. Golic
    On the relationship between the separability measures and the Bayes probability of error. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:5, pp:694-701 [Journal]
  72. Jovan Dj. Golic
    On the linear complexity of functions of periodic GF(q) sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1989, v:35, n:1, pp:69-75 [Journal]
  73. Jovan Dj. Golic
    Periods of Interleaved and Nonuniformly Decimated Sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:3, pp:1257-1260 [Journal]
  74. Jovan Dj. Golic
    Comment on 'Relations Between Entropy and Error Probability'. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:1, pp:372- [Journal]
  75. Jovan Dj. Golic
    Linear models for a time-variant permutation generator. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2374-2382 [Journal]
  76. Jovan Dj. Golic, Renato Menicocci
    Statistical distinguishers for irregularly decimated linear recurring sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:3, pp:1153-1159 [Journal]
  77. Jovan Dj. Golic, Miodrag J. Mihaljevic
    Minimal linear equivalent analysis of a variable-memory binary sequence generator. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:1, pp:190-0 [Journal]
  78. Jovan Dj. Golic, Milorad M. Obradovic
    A lower bound on the redundancy of D-ary Huffman codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:6, pp:910-0 [Journal]
  79. Jovan Dj. Golic, Milorad M. Obradovic
    Correction to 'A lower bound on the redundancy of D-ary Huffman codes' (Nov 87 910-911). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:2, pp:443- [Journal]
  80. Jovan Dj. Golic, Miodrag V. Zivkovic
    On the linear complexity of nonuniformly decimated PN-sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1077-0 [Journal]
  81. Renato Menicocci, Jovan Dj. Golic
    Correlation Attacks on Up/Down and Stop/Go Cascades. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:486-498 [Journal]
  82. Miodrag J. Mihaljevic, Jovan Dj. Golic
    A method for convergence analysis of iterative probabilistic decoding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:6, pp:2206-2211 [Journal]
  83. Jovan Dj. Golic, Madalina Baltatu
    Soft Generation of Secure Biometric Keys. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:107-121 [Conf]
  84. Markus Dichtl, Jovan Dj. Golic
    High-Speed True Random Number Generation with Logic Gates Only. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:45-62 [Conf]

Search in 0.004secs, Finished in 0.663secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002