2007 |
31 | EE | Marc P. C. Fossorier,
Miodrag J. Mihaljevic,
Hideki Imai:
Modeling Block Decoding Approaches for the Fast Correlation Attack.
IEEE Transactions on Information Theory 53(12): 4728-4737 (2007) |
30 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes.
IEICE Transactions 90-A(6): 1248-1251 (2007) |
2006 |
29 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation.
AAECC 2006: 203-214 |
28 | EE | Jian Wang,
Miodrag J. Mihaljevic,
Lein Harn,
Hideki Imai:
A Hierarchical Key Management Approach for Secure Multicast.
ARCS 2006: 422-434 |
27 | EE | Marc P. C. Fossorier,
Miodrag J. Mihaljevic,
Hideki Imai,
Yang Cui,
Kanta Matsuura:
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.
INDOCRYPT 2006: 48-62 |
2005 |
26 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Security Weaknesses of Certain Broadcast Encryption Schemes.
DRMTICS 2005: 228-245 |
25 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys.
DRMTICS 2005: 258-276 |
24 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks.
INDOCRYPT 2005: 155-168 |
2004 |
23 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.
ICICS 2004: 375-387 |
22 | EE | Miodrag J. Mihaljevic,
Hideki Imai:
The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters.
SCN 2004: 310-323 |
2003 |
21 | EE | Miodrag J. Mihaljevic:
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy.
ASIACRYPT 2003: 137-154 |
20 | EE | Miodrag J. Mihaljevic:
Broadcast Encryption Schemes Based on the Sectioned Key Tree.
ICICS 2003: 158-169 |
2002 |
19 | EE | Paul Camion,
Miodrag J. Mihaljevic,
Hideki Imai:
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).
Selected Areas in Cryptography 2002: 196-213 |
2001 |
18 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Fast Correlation Attack Algorithm with List Decoding and an Application.
FSE 2001: 196-210 |
2000 |
17 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack.
FSE 2000: 196-212 |
16 | | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
A method for convergence analysis of iterative probabilistic decoding.
IEEE Transactions on Information Theory 46(6): 2206-2211 (2000) |
1999 |
15 | | Marc P. C. Fossorier,
Miodrag J. Mihaljevic,
Hideki Imai:
Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications.
AAECC 1999: 282-293 |
1998 |
14 | EE | Miodrag J. Mihaljevic,
Yuliang Zheng,
Hideki Imai:
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation.
Public Key Cryptography 1998: 217-233 |
1997 |
13 | | Miodrag J. Mihaljevic:
An Iterative Probabilistic Decoding Algorithm for Binary Linear Block Codes Beyond the Half Minimum Distance.
AAECC 1997: 237-249 |
12 | | Miodrag J. Mihaljevic:
Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach.
AAECC 1997: 250-262 |
11 | | Miodrag J. Mihaljevic:
An improved key stream generator based on the programmable cellular automata.
ICICS 1997: 181-191 |
1996 |
10 | | Miodrag J. Mihaljevic:
A faster cryptanalysis of the self-shrinking generator.
ACISP 1996: 182-189 |
1994 |
9 | | Miodrag J. Mihaljevic:
A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function.
ASIACRYPT 1994: 67-79 |
1993 |
8 | | Miodrag J. Mihaljevic:
On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II.
Error Control, Cryptology, and Speech Compression 1993: 13-24 |
1992 |
7 | | Miodrag J. Mihaljevic:
An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure.
AUSCRYPT 1992: 349-356 |
6 | EE | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence.
EUROCRYPT 1992: 124-137 |
1991 |
5 | EE | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
A Comparison of Cryptoanalytic Principles Based on Iterative Error-Correction.
EUROCRYPT 1991: 527-531 |
4 | | Jovan Dj. Golic,
Miodrag J. Mihaljevic:
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance.
J. Cryptology 3(3): 201-212 (1991) |
1990 |
3 | | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence.
AUSCRYPT 1990: 165-175 |
2 | EE | Jovan Dj. Golic,
Miodrag J. Mihaljevic:
A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach.
EUROCRYPT 1990: 487-491 |
1 | | Jovan Dj. Golic,
Miodrag J. Mihaljevic:
Minimal linear equivalent analysis of a variable-memory binary sequence generator.
IEEE Transactions on Information Theory 36(1): 190- (1990) |