dblp.uni-trier.dewww.uni-trier.de

Jovan Dj. Golic

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
87EEJovan Dj. Golic, Madalina Baltatu: Entropy Analysis and New Constructions of Biometric Key Generation Systems. IEEE Transactions on Information Theory 54(5): 2026-2040 (2008)
2007
86EEJovan Dj. Golic, Madalina Baltatu: Soft Generation of Secure Biometric Keys. ACISP 2007: 107-121
85EEMarkus Dichtl, Jovan Dj. Golic: High-Speed True Random Number Generation with Logic Gates Only. CHES 2007: 45-62
84EEJovan Dj. Golic: Exact Probabilistic Analysis of Memoryless Combiners. IEEE Transactions on Information Theory 53(11): 3958-3972 (2007)
2006
83EEJovan Dj. Golic: New Methods for Digital Generation and Postprocessing of Random Data. IEEE Trans. Computers 55(10): 1217-1229 (2006)
82EEJovan Dj. Golic: Vectorial Boolean functions and induced algebraic equations. IEEE Transactions on Information Theory 52(2): 528-537 (2006)
81EEJovan Dj. Golic, Renato Menicocci: Statistical distinguishers for irregularly decimated linear recurring sequences. IEEE Transactions on Information Theory 52(3): 1153-1159 (2006)
2005
80EEJosef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic: Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. ICISC 2005: 210-228
79EEJovan Dj. Golic, Philip Hawkes: Vectorial Approach to Fast Correlation Attacks. Des. Codes Cryptography 35(1): 5-19 (2005)
78EEJovan Dj. Golic: Embedding probabilities for the Alternating Step Generator. IEEE Transactions on Information Theory 51(7): 2543-2553 (2005)
2004
77EEJovan Dj. Golic: A Weakness of the Linear Part of Stream Cipher MUGI. FSE 2004: 178-192
76EEJovan Dj. Golic, Renato Menicocci: Correlation Analysis of the Alternating Step Generator. Des. Codes Cryptography 31(1): 51-74 (2004)
2003
75EEJovan Dj. Golic: DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. CHES 2003: 98-112
74EEJovan Dj. Golic, Guglielmo Morgari: On the Resynchronization Attack. FSE 2003: 100-110
73EEJovan Dj. Golic: On the Success of the Embedding Attack on the Alternating Step Generator. Selected Areas in Cryptography 2003: 262-274
72EEJovan Dj. Golic, Renato Menicocci: Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators. J. Cryptology 16(1): 41-68 (2003)
2002
71EEAndrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson: The LILI-II Keystream Generator. ACISP 2002: 25-39
70EEJovan Dj. Golic, Christophe Tymen: Multiplicative Masking and Power Analysis of AES. CHES 2002: 198-212
69EEJovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari: Linear Cryptanalysis of Bluetooth Stream Cipher. EUROCRYPT 2002: 238-255
68EEJovan Dj. Golic, Renato Menicocci: Computation of Edit Probabilities and Edit Distances for the A5-Type Keystream Generator. J. Complexity 18(1): 356-374 (2002)
2001
67EEJovan Dj. Golic: Correlation Analysis of the Shrinking Generator. CRYPTO 2001: 440-457
66 Jovan Dj. Golic: How to Construct Cryptographic Primitives from Stream Ciphers. Computers & Security 20(1): 79-89 (2001)
65 Jovan Dj. Golic: Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory. IEEE Transactions on Information Theory 47(3): 1032-1041 (2001)
64 Jovan Dj. Golic: Iterative optimum symbol-by-symbol decoding and fast correlation attacks. IEEE Transactions on Information Theory 47(7): 3040-3049 (2001)
63EEJovan Dj. Golic: A probabilistic cryptanalytic method for a time-variant permutation generator. Inf. Process. Lett. 80(2): 67-73 (2001)
2000
62 Jovan Dj. Golic: Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. ACISP 2000: 220-233
61EEJovan Dj. Golic: Modes of Operation of Stream Ciphers. Selected Areas in Cryptography 2000: 233-247
60EELeonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan: LILI Keystream Generator. Selected Areas in Cryptography 2000: 248-261
59EEJovan Dj. Golic, Andrew Clark, Ed Dawson: Generalized Inversion Attack on Nonlinear Filter Generators. IEEE Trans. Computers 49(10): 1100-1109 (2000)
58 Jovan Dj. Golic: Cryptanalysis of three mutually clock-controlled stop/go shift registers. IEEE Transactions on Information Theory 46(3): 1081-1090 (2000)
57 Miodrag J. Mihaljevic, Jovan Dj. Golic: A method for convergence analysis of iterative probabilistic decoding. IEEE Transactions on Information Theory 46(6): 2206-2211 (2000)
56EEJovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson: Fast Correlation Attacks on the Summation Generator. J. Cryptology 13(2): 245-262 (2000)
1999
55EEJovan Dj. Golic, Andrew Clark, Ed Dawson: Inversion Attack and Branching. ACISP 1999: 88-102
54EERenato Menicocci, Jovan Dj. Golic: Edit Probability Correlation Attack on the Bilateral Stop/Go Generator. IMA Int. Conf. 1999: 201-212
53 Jovan Dj. Golic, Andrew Clark, Ed Dawson: Inversion Attack and Branching. Australian Computer Journal 31(2): 44-53 (1999)
52 Jovan Dj. Golic: Comment on 'Relations Between Entropy and Error Probability'. IEEE Transactions on Information Theory 45(1): 372 (1999)
51 Renato Menicocci, Jovan Dj. Golic: Correlation Attacks on Up/Down and Stop/Go Cascades. IEEE Transactions on Information Theory 45(2): 486-498 (1999)
50 Jovan Dj. Golic: Linear models for a time-variant permutation generator. IEEE Transactions on Information Theory 45(7): 2374-2382 (1999)
49EEJovan Dj. Golic: Stream Cipher Encryption of Random Access Files. Inf. Process. Lett. 69(3): 145-148 (1999)
48EELeone Simpson, Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson: A Fast Correlation Attack on Multiplexer Generators. Inf. Process. Lett. 70(2): 89-93 (1999)
1998
47EEJovan Dj. Golic, Renato Menicocci: Correlation Attacks on Up/Down Cascades. ACISP 1998: 123-134
46EELeone Simpson, Jovan Dj. Golic, Ed Dawson: A Probabilistic Correlation Attack on the Shrinking Generator. ACISP 1998: 147-158
45 Jovan Dj. Golic: Periods of Interleaved and Nonuniformly Decimated Sequences. IEEE Transactions on Information Theory 44(3): 1257-1260 (1998)
44EEJovan Dj. Golic: On Matroid Characterization of Ideal Secret Sharing Schemes. J. Cryptology 11(2): 75-86 (1998)
1997
43 M. Salmasidazeh, Leone Simpson, Jovan Dj. Golic, Ed Dawson: Fast Correlation Attacks and Multiple Linear Approximations. ACISP 1997: 228-239
42EEJovan Dj. Golic, Renato Menicocci: Edit Distance Correlation Attack on the Alternating Step Generator. CRYPTO 1997: 499-512
41EEJovan Dj. Golic: Linear Statistical Weakness of Alleged RC4 Keystream Generator. EUROCRYPT 1997: 226-238
40EEJovan Dj. Golic: Cryptanalysis of Alleged A5 Stream Cipher. EUROCRYPT 1997: 239-255
39EEJovan Dj. Golic, Mahmoud Salmasizadeh, Leone Simpson, Ed Dawson: Fast Correlation Attacks on Nonlinear Filter Generators. Inf. Process. Lett. 64(1): 37-42 (1997)
1996
38 Jovan Dj. Golic: On period of multiplexed sequences. ACISP 1996: 158-168
37 Jovan Dj. Golic: Edit distance correlation attacks on clock-controlled combiners with memory. ACISP 1996: 169-181
36EEJovan Dj. Golic: Fast Low Order Approximation of Cryptographic Functions. EUROCRYPT 1996: 268-282
35 Andrew Clark, Jovan Dj. Golic, Ed Dawson: A Comparison of Fast Correlation Attacks. FSE 1996: 145-157
34 Jovan Dj. Golic: On the Security of Nonlinear Filter Generators. FSE 1996: 173-188
33 Jovan Dj. Golic: Linear Models for Keystream Generators. IEEE Trans. Computers 45(1): 41-49 (1996)
32 Jovan Dj. Golic, Slobodan V. Petrovic: Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators. IEEE Trans. Computers 45(4): 482-486 (1996)
31 Jovan Dj. Golic: Correlation Properties of a General Binary Combiner with Memory. J. Cryptology 9(2): 111-126 (1996)
30EEJovan Dj. Golic: Constrained Embedding Probability for Two Binary Strings. SIAM J. Discrete Math. 9(3): 360-364 (1996)
1995
29 Ed Dawson, Jovan Dj. Golic: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings Springer 1995
28 Jovan Dj. Golic: A Note on Nonuniform Decimation of Periodic Sequences. Cryptography: Policy and Algorithms 1995: 125-131
27 Helen Gustafson, Ed Dawson, Jovan Dj. Golic: Randomness Measures Related to Subset Occurrence. Cryptography: Policy and Algorithms 1995: 132-143
26 Jovan Dj. Golic, Luke O'Connor: A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps. Cryptography: Policy and Algorithms 1995: 174-185
25 Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson: Discrete Optimisation and Fast Correlation Attacks. Cryptography: Policy and Algorithms 1995: 186-200
24EEJovan Dj. Golic: Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers. EUROCRYPT 1995: 248-262
23 Jovan Dj. Golic, Slobodan V. Petrovic: Constrained Many-to-One String Editing with Memory. Inf. Sci. 86(1-3): 61-76 (1995)
1994
22 Luke O'Connor, Jovan Dj. Golic: A Unified Markow Approach to Differential and Linear Cryptanalysis. ASIACRYPT 1994: 387-397
21 Jovan Dj. Golic: Intrinsic Statistical Weakness of Keystream Generators. ASIACRYPT 1994: 91-103
20EEJovan Dj. Golic, Luke O'Connor: Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. EUROCRYPT 1994: 230-243
19 Jovan Dj. Golic: Linear Cryptanalysis of Stream Ciphers. FSE 1994: 154-169
1993
18 Jovan Dj. Golic: On the Security of Shift Register Based Keystream Generators. FSE 1993: 90-100
17EESlobodan V. Petrovic, Jovan Dj. Golic: String editing under a combination of constraints. Inf. Sci. 74(1-2): 151-163 (1993)
1992
16EEJovan Dj. Golic: Correlation via Linear Sequential Circuit Approximation of Combiners with memory. EUROCRYPT 1992: 113-123
15EEMiodrag J. Mihaljevic, Jovan Dj. Golic: Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. EUROCRYPT 1992: 124-137
14EEJovan Dj. Golic, Slobodan V. Petrovic: A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. EUROCRYPT 1992: 472-476
1991
13EEJovan Dj. Golic: The Number of Output Sequences of a Binary Sequence Generator. EUROCRYPT 1991: 160-167
12EEMiodrag J. Mihaljevic, Jovan Dj. Golic: A Comparison of Cryptoanalytic Principles Based on Iterative Error-Correction. EUROCRYPT 1991: 527-531
11 Jovan Dj. Golic, Miodrag J. Mihaljevic: A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. J. Cryptology 3(3): 201-212 (1991)
1990
10 Miodrag J. Mihaljevic, Jovan Dj. Golic: A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. AUSCRYPT 1990: 165-175
9EEJovan Dj. Golic, Miodrag J. Mihaljevic: A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach. EUROCRYPT 1990: 487-491
8 Jovan Dj. Golic, Miodrag J. Mihaljevic: Minimal linear equivalent analysis of a variable-memory binary sequence generator. IEEE Transactions on Information Theory 36(1): 190- (1990)
7 Jovan Dj. Golic, Milorad M. Obradovic: Correction to 'A lower bound on the redundancy of D-ary Huffman codes' (Nov 87 910-911). IEEE Transactions on Information Theory 36(2): 443 (1990)
1989
6 Jovan Dj. Golic: On the linear complexity of functions of periodic GF(q) sequences. IEEE Transactions on Information Theory 35(1): 69-75 (1989)
1988
5 Jovan Dj. Golic, Miodrag V. Zivkovic: On the linear complexity of nonuniformly decimated PN-sequences. IEEE Transactions on Information Theory 34(5): 1077- (1988)
1987
4 Jovan Dj. Golic: On the relationship between the efficiency measures of multicategory information systems. IEEE Transactions on Information Theory 33(4): 531-538 (1987)
3 Jovan Dj. Golic: On the relationship between the information measures and the Bayes probability of error. IEEE Transactions on Information Theory 33(5): 681-693 (1987)
2 Jovan Dj. Golic: On the relationship between the separability measures and the Bayes probability of error. IEEE Transactions on Information Theory 33(5): 694-701 (1987)
1 Jovan Dj. Golic, Milorad M. Obradovic: A lower bound on the redundancy of D-ary Huffman codes. IEEE Transactions on Information Theory 33(6): 910- (1987)

Coauthor Index

1Vittorio Bagini [69]
2Madalina Baltatu [86] [87]
3Andrew Clark [25] [35] [53] [55] [59] [71]
4Ed Dawson [25] [27] [29] [35] [39] [43] [46] [48] [53] [55] [56] [59] [60] [71]
5Markus Dichtl [85]
6Joanne Fuller [71]
7Helen Gustafson [27]
8Philip Hawkes [79]
9Abdollah Khodkar [25]
10Hoon Jae Lee [71]
11Renato Menicocci [42] [47] [51] [54] [68] [72] [76] [81]
12Miodrag J. Mihaljevic [8] [9] [10] [11] [12] [15] [57]
13William Millan [60] [71]
14Sang-Jae Moon [71]
15Guglielmo Morgari [69] [74]
16Luke O'Connor [20] [22] [26]
17Milorad M. Obradovic [1] [7]
18Slobodan V. Petrovic [14] [17] [23] [32]
19Josef Pieprzyk [80]
20M. Salmasidazeh [43]
21Mahmoud Salmasizadeh [25] [39] [48] [56]
22Leone Simpson [39] [43] [46] [48] [71]
23Leonie Ruth Simpson [60]
24Christophe Tymen [70]
25Xian-Mo Zhang [80]
26Miodrag V. Zivkovic [5]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)