2008 |
87 | EE | Jovan Dj. Golic,
Madalina Baltatu:
Entropy Analysis and New Constructions of Biometric Key Generation Systems.
IEEE Transactions on Information Theory 54(5): 2026-2040 (2008) |
2007 |
86 | EE | Jovan Dj. Golic,
Madalina Baltatu:
Soft Generation of Secure Biometric Keys.
ACISP 2007: 107-121 |
85 | EE | Markus Dichtl,
Jovan Dj. Golic:
High-Speed True Random Number Generation with Logic Gates Only.
CHES 2007: 45-62 |
84 | EE | Jovan Dj. Golic:
Exact Probabilistic Analysis of Memoryless Combiners.
IEEE Transactions on Information Theory 53(11): 3958-3972 (2007) |
2006 |
83 | EE | Jovan Dj. Golic:
New Methods for Digital Generation and Postprocessing of Random Data.
IEEE Trans. Computers 55(10): 1217-1229 (2006) |
82 | EE | Jovan Dj. Golic:
Vectorial Boolean functions and induced algebraic equations.
IEEE Transactions on Information Theory 52(2): 528-537 (2006) |
81 | EE | Jovan Dj. Golic,
Renato Menicocci:
Statistical distinguishers for irregularly decimated linear recurring sequences.
IEEE Transactions on Information Theory 52(3): 1153-1159 (2006) |
2005 |
80 | EE | Josef Pieprzyk,
Xian-Mo Zhang,
Jovan Dj. Golic:
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.
ICISC 2005: 210-228 |
79 | EE | Jovan Dj. Golic,
Philip Hawkes:
Vectorial Approach to Fast Correlation Attacks.
Des. Codes Cryptography 35(1): 5-19 (2005) |
78 | EE | Jovan Dj. Golic:
Embedding probabilities for the Alternating Step Generator.
IEEE Transactions on Information Theory 51(7): 2543-2553 (2005) |
2004 |
77 | EE | Jovan Dj. Golic:
A Weakness of the Linear Part of Stream Cipher MUGI.
FSE 2004: 178-192 |
76 | EE | Jovan Dj. Golic,
Renato Menicocci:
Correlation Analysis of the Alternating Step Generator.
Des. Codes Cryptography 31(1): 51-74 (2004) |
2003 |
75 | EE | Jovan Dj. Golic:
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits.
CHES 2003: 98-112 |
74 | EE | Jovan Dj. Golic,
Guglielmo Morgari:
On the Resynchronization Attack.
FSE 2003: 100-110 |
73 | EE | Jovan Dj. Golic:
On the Success of the Embedding Attack on the Alternating Step Generator.
Selected Areas in Cryptography 2003: 262-274 |
72 | EE | Jovan Dj. Golic,
Renato Menicocci:
Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators.
J. Cryptology 16(1): 41-68 (2003) |
2002 |
71 | EE | Andrew Clark,
Ed Dawson,
Joanne Fuller,
Jovan Dj. Golic,
Hoon Jae Lee,
William Millan,
Sang-Jae Moon,
Leone Simpson:
The LILI-II Keystream Generator.
ACISP 2002: 25-39 |
70 | EE | Jovan Dj. Golic,
Christophe Tymen:
Multiplicative Masking and Power Analysis of AES.
CHES 2002: 198-212 |
69 | EE | Jovan Dj. Golic,
Vittorio Bagini,
Guglielmo Morgari:
Linear Cryptanalysis of Bluetooth Stream Cipher.
EUROCRYPT 2002: 238-255 |
68 | EE | Jovan Dj. Golic,
Renato Menicocci:
Computation of Edit Probabilities and Edit Distances for the A5-Type Keystream Generator.
J. Complexity 18(1): 356-374 (2002) |
2001 |
67 | EE | Jovan Dj. Golic:
Correlation Analysis of the Shrinking Generator.
CRYPTO 2001: 440-457 |
66 | | Jovan Dj. Golic:
How to Construct Cryptographic Primitives from Stream Ciphers.
Computers & Security 20(1): 79-89 (2001) |
65 | | Jovan Dj. Golic:
Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory.
IEEE Transactions on Information Theory 47(3): 1032-1041 (2001) |
64 | | Jovan Dj. Golic:
Iterative optimum symbol-by-symbol decoding and fast correlation attacks.
IEEE Transactions on Information Theory 47(7): 3040-3049 (2001) |
63 | EE | Jovan Dj. Golic:
A probabilistic cryptanalytic method for a time-variant permutation generator.
Inf. Process. Lett. 80(2): 67-73 (2001) |
2000 |
62 | | Jovan Dj. Golic:
Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator.
ACISP 2000: 220-233 |
61 | EE | Jovan Dj. Golic:
Modes of Operation of Stream Ciphers.
Selected Areas in Cryptography 2000: 233-247 |
60 | EE | Leonie Ruth Simpson,
Ed Dawson,
Jovan Dj. Golic,
William Millan:
LILI Keystream Generator.
Selected Areas in Cryptography 2000: 248-261 |
59 | EE | Jovan Dj. Golic,
Andrew Clark,
Ed Dawson:
Generalized Inversion Attack on Nonlinear Filter Generators.
IEEE Trans. Computers 49(10): 1100-1109 (2000) |
58 | | Jovan Dj. Golic:
Cryptanalysis of three mutually clock-controlled stop/go shift registers.
IEEE Transactions on Information Theory 46(3): 1081-1090 (2000) |
57 | | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
A method for convergence analysis of iterative probabilistic decoding.
IEEE Transactions on Information Theory 46(6): 2206-2211 (2000) |
56 | EE | Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Ed Dawson:
Fast Correlation Attacks on the Summation Generator.
J. Cryptology 13(2): 245-262 (2000) |
1999 |
55 | EE | Jovan Dj. Golic,
Andrew Clark,
Ed Dawson:
Inversion Attack and Branching.
ACISP 1999: 88-102 |
54 | EE | Renato Menicocci,
Jovan Dj. Golic:
Edit Probability Correlation Attack on the Bilateral Stop/Go Generator.
IMA Int. Conf. 1999: 201-212 |
53 | | Jovan Dj. Golic,
Andrew Clark,
Ed Dawson:
Inversion Attack and Branching.
Australian Computer Journal 31(2): 44-53 (1999) |
52 | | Jovan Dj. Golic:
Comment on 'Relations Between Entropy and Error Probability'.
IEEE Transactions on Information Theory 45(1): 372 (1999) |
51 | | Renato Menicocci,
Jovan Dj. Golic:
Correlation Attacks on Up/Down and Stop/Go Cascades.
IEEE Transactions on Information Theory 45(2): 486-498 (1999) |
50 | | Jovan Dj. Golic:
Linear models for a time-variant permutation generator.
IEEE Transactions on Information Theory 45(7): 2374-2382 (1999) |
49 | EE | Jovan Dj. Golic:
Stream Cipher Encryption of Random Access Files.
Inf. Process. Lett. 69(3): 145-148 (1999) |
48 | EE | Leone Simpson,
Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Ed Dawson:
A Fast Correlation Attack on Multiplexer Generators.
Inf. Process. Lett. 70(2): 89-93 (1999) |
1998 |
47 | EE | Jovan Dj. Golic,
Renato Menicocci:
Correlation Attacks on Up/Down Cascades.
ACISP 1998: 123-134 |
46 | EE | Leone Simpson,
Jovan Dj. Golic,
Ed Dawson:
A Probabilistic Correlation Attack on the Shrinking Generator.
ACISP 1998: 147-158 |
45 | | Jovan Dj. Golic:
Periods of Interleaved and Nonuniformly Decimated Sequences.
IEEE Transactions on Information Theory 44(3): 1257-1260 (1998) |
44 | EE | Jovan Dj. Golic:
On Matroid Characterization of Ideal Secret Sharing Schemes.
J. Cryptology 11(2): 75-86 (1998) |
1997 |
43 | | M. Salmasidazeh,
Leone Simpson,
Jovan Dj. Golic,
Ed Dawson:
Fast Correlation Attacks and Multiple Linear Approximations.
ACISP 1997: 228-239 |
42 | EE | Jovan Dj. Golic,
Renato Menicocci:
Edit Distance Correlation Attack on the Alternating Step Generator.
CRYPTO 1997: 499-512 |
41 | EE | Jovan Dj. Golic:
Linear Statistical Weakness of Alleged RC4 Keystream Generator.
EUROCRYPT 1997: 226-238 |
40 | EE | Jovan Dj. Golic:
Cryptanalysis of Alleged A5 Stream Cipher.
EUROCRYPT 1997: 239-255 |
39 | EE | Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Leone Simpson,
Ed Dawson:
Fast Correlation Attacks on Nonlinear Filter Generators.
Inf. Process. Lett. 64(1): 37-42 (1997) |
1996 |
38 | | Jovan Dj. Golic:
On period of multiplexed sequences.
ACISP 1996: 158-168 |
37 | | Jovan Dj. Golic:
Edit distance correlation attacks on clock-controlled combiners with memory.
ACISP 1996: 169-181 |
36 | EE | Jovan Dj. Golic:
Fast Low Order Approximation of Cryptographic Functions.
EUROCRYPT 1996: 268-282 |
35 | | Andrew Clark,
Jovan Dj. Golic,
Ed Dawson:
A Comparison of Fast Correlation Attacks.
FSE 1996: 145-157 |
34 | | Jovan Dj. Golic:
On the Security of Nonlinear Filter Generators.
FSE 1996: 173-188 |
33 | | Jovan Dj. Golic:
Linear Models for Keystream Generators.
IEEE Trans. Computers 45(1): 41-49 (1996) |
32 | | Jovan Dj. Golic,
Slobodan V. Petrovic:
Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators.
IEEE Trans. Computers 45(4): 482-486 (1996) |
31 | | Jovan Dj. Golic:
Correlation Properties of a General Binary Combiner with Memory.
J. Cryptology 9(2): 111-126 (1996) |
30 | EE | Jovan Dj. Golic:
Constrained Embedding Probability for Two Binary Strings.
SIAM J. Discrete Math. 9(3): 360-364 (1996) |
1995 |
29 | | Ed Dawson,
Jovan Dj. Golic:
Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings
Springer 1995 |
28 | | Jovan Dj. Golic:
A Note on Nonuniform Decimation of Periodic Sequences.
Cryptography: Policy and Algorithms 1995: 125-131 |
27 | | Helen Gustafson,
Ed Dawson,
Jovan Dj. Golic:
Randomness Measures Related to Subset Occurrence.
Cryptography: Policy and Algorithms 1995: 132-143 |
26 | | Jovan Dj. Golic,
Luke O'Connor:
A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps.
Cryptography: Policy and Algorithms 1995: 174-185 |
25 | | Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Andrew Clark,
Abdollah Khodkar,
Ed Dawson:
Discrete Optimisation and Fast Correlation Attacks.
Cryptography: Policy and Algorithms 1995: 186-200 |
24 | EE | Jovan Dj. Golic:
Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers.
EUROCRYPT 1995: 248-262 |
23 | | Jovan Dj. Golic,
Slobodan V. Petrovic:
Constrained Many-to-One String Editing with Memory.
Inf. Sci. 86(1-3): 61-76 (1995) |
1994 |
22 | | Luke O'Connor,
Jovan Dj. Golic:
A Unified Markow Approach to Differential and Linear Cryptanalysis.
ASIACRYPT 1994: 387-397 |
21 | | Jovan Dj. Golic:
Intrinsic Statistical Weakness of Keystream Generators.
ASIACRYPT 1994: 91-103 |
20 | EE | Jovan Dj. Golic,
Luke O'Connor:
Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers.
EUROCRYPT 1994: 230-243 |
19 | | Jovan Dj. Golic:
Linear Cryptanalysis of Stream Ciphers.
FSE 1994: 154-169 |
1993 |
18 | | Jovan Dj. Golic:
On the Security of Shift Register Based Keystream Generators.
FSE 1993: 90-100 |
17 | EE | Slobodan V. Petrovic,
Jovan Dj. Golic:
String editing under a combination of constraints.
Inf. Sci. 74(1-2): 151-163 (1993) |
1992 |
16 | EE | Jovan Dj. Golic:
Correlation via Linear Sequential Circuit Approximation of Combiners with memory.
EUROCRYPT 1992: 113-123 |
15 | EE | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence.
EUROCRYPT 1992: 124-137 |
14 | EE | Jovan Dj. Golic,
Slobodan V. Petrovic:
A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance.
EUROCRYPT 1992: 472-476 |
1991 |
13 | EE | Jovan Dj. Golic:
The Number of Output Sequences of a Binary Sequence Generator.
EUROCRYPT 1991: 160-167 |
12 | EE | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
A Comparison of Cryptoanalytic Principles Based on Iterative Error-Correction.
EUROCRYPT 1991: 527-531 |
11 | | Jovan Dj. Golic,
Miodrag J. Mihaljevic:
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance.
J. Cryptology 3(3): 201-212 (1991) |
1990 |
10 | | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence.
AUSCRYPT 1990: 165-175 |
9 | EE | Jovan Dj. Golic,
Miodrag J. Mihaljevic:
A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach.
EUROCRYPT 1990: 487-491 |
8 | | Jovan Dj. Golic,
Miodrag J. Mihaljevic:
Minimal linear equivalent analysis of a variable-memory binary sequence generator.
IEEE Transactions on Information Theory 36(1): 190- (1990) |
7 | | Jovan Dj. Golic,
Milorad M. Obradovic:
Correction to 'A lower bound on the redundancy of D-ary Huffman codes' (Nov 87 910-911).
IEEE Transactions on Information Theory 36(2): 443 (1990) |
1989 |
6 | | Jovan Dj. Golic:
On the linear complexity of functions of periodic GF(q) sequences.
IEEE Transactions on Information Theory 35(1): 69-75 (1989) |
1988 |
5 | | Jovan Dj. Golic,
Miodrag V. Zivkovic:
On the linear complexity of nonuniformly decimated PN-sequences.
IEEE Transactions on Information Theory 34(5): 1077- (1988) |
1987 |
4 | | Jovan Dj. Golic:
On the relationship between the efficiency measures of multicategory information systems.
IEEE Transactions on Information Theory 33(4): 531-538 (1987) |
3 | | Jovan Dj. Golic:
On the relationship between the information measures and the Bayes probability of error.
IEEE Transactions on Information Theory 33(5): 681-693 (1987) |
2 | | Jovan Dj. Golic:
On the relationship between the separability measures and the Bayes probability of error.
IEEE Transactions on Information Theory 33(5): 694-701 (1987) |
1 | | Jovan Dj. Golic,
Milorad M. Obradovic:
A lower bound on the redundancy of D-ary Huffman codes.
IEEE Transactions on Information Theory 33(6): 910- (1987) |