dblp.uni-trier.dewww.uni-trier.de

Miodrag J. Mihaljevic

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2007
31EEMarc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai: Modeling Block Decoding Approaches for the Fast Correlation Attack. IEEE Transactions on Information Theory 53(12): 4728-4737 (2007)
30EEMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes. IEICE Transactions 90-A(6): 1248-1251 (2007)
2006
29EEMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. AAECC 2006: 203-214
28EEJian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai: A Hierarchical Key Management Approach for Secure Multicast. ARCS 2006: 422-434
27EEMarc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura: An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. INDOCRYPT 2006: 48-62
2005
26EEMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: Security Weaknesses of Certain Broadcast Encryption Schemes. DRMTICS 2005: 228-245
25EEMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. DRMTICS 2005: 258-276
24EEMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. INDOCRYPT 2005: 155-168
2004
23EEMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. ICICS 2004: 375-387
22EEMiodrag J. Mihaljevic, Hideki Imai: The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. SCN 2004: 310-323
2003
21EEMiodrag J. Mihaljevic: Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. ASIACRYPT 2003: 137-154
20EEMiodrag J. Mihaljevic: Broadcast Encryption Schemes Based on the Sectioned Key Tree. ICICS 2003: 158-169
2002
19EEPaul Camion, Miodrag J. Mihaljevic, Hideki Imai: Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). Selected Areas in Cryptography 2002: 196-213
2001
18EEMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: Fast Correlation Attack Algorithm with List Decoding and an Application. FSE 2001: 196-210
2000
17EEMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. FSE 2000: 196-212
16 Miodrag J. Mihaljevic, Jovan Dj. Golic: A method for convergence analysis of iterative probabilistic decoding. IEEE Transactions on Information Theory 46(6): 2206-2211 (2000)
1999
15 Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai: Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications. AAECC 1999: 282-293
1998
14EEMiodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai: A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Public Key Cryptography 1998: 217-233
1997
13 Miodrag J. Mihaljevic: An Iterative Probabilistic Decoding Algorithm for Binary Linear Block Codes Beyond the Half Minimum Distance. AAECC 1997: 237-249
12 Miodrag J. Mihaljevic: Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach. AAECC 1997: 250-262
11 Miodrag J. Mihaljevic: An improved key stream generator based on the programmable cellular automata. ICICS 1997: 181-191
1996
10 Miodrag J. Mihaljevic: A faster cryptanalysis of the self-shrinking generator. ACISP 1996: 182-189
1994
9 Miodrag J. Mihaljevic: A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. ASIACRYPT 1994: 67-79
1993
8 Miodrag J. Mihaljevic: On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II. Error Control, Cryptology, and Speech Compression 1993: 13-24
1992
7 Miodrag J. Mihaljevic: An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure. AUSCRYPT 1992: 349-356
6EEMiodrag J. Mihaljevic, Jovan Dj. Golic: Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. EUROCRYPT 1992: 124-137
1991
5EEMiodrag J. Mihaljevic, Jovan Dj. Golic: A Comparison of Cryptoanalytic Principles Based on Iterative Error-Correction. EUROCRYPT 1991: 527-531
4 Jovan Dj. Golic, Miodrag J. Mihaljevic: A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. J. Cryptology 3(3): 201-212 (1991)
1990
3 Miodrag J. Mihaljevic, Jovan Dj. Golic: A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. AUSCRYPT 1990: 165-175
2EEJovan Dj. Golic, Miodrag J. Mihaljevic: A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach. EUROCRYPT 1990: 487-491
1 Jovan Dj. Golic, Miodrag J. Mihaljevic: Minimal linear equivalent analysis of a variable-memory binary sequence generator. IEEE Transactions on Information Theory 36(1): 190- (1990)

Coauthor Index

1Paul Camion [19]
2Yang Cui [27]
3Marc P. C. Fossorier [15] [17] [18] [23] [24] [25] [26] [27] [29] [30] [31]
4Jovan Dj. Golic [1] [2] [3] [4] [5] [6] [16]
5Lein Harn [28]
6Hideki Imai [14] [15] [17] [18] [19] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31]
7Kanta Matsuura [27]
8Jian Wang [28]
9Yuliang Zheng [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)