| 2007 |
| 31 | EE | Marc P. C. Fossorier,
Miodrag J. Mihaljevic,
Hideki Imai:
Modeling Block Decoding Approaches for the Fast Correlation Attack.
IEEE Transactions on Information Theory 53(12): 4728-4737 (2007) |
| 30 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes.
IEICE Transactions 90-A(6): 1248-1251 (2007) |
| 2006 |
| 29 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation.
AAECC 2006: 203-214 |
| 28 | EE | Jian Wang,
Miodrag J. Mihaljevic,
Lein Harn,
Hideki Imai:
A Hierarchical Key Management Approach for Secure Multicast.
ARCS 2006: 422-434 |
| 27 | EE | Marc P. C. Fossorier,
Miodrag J. Mihaljevic,
Hideki Imai,
Yang Cui,
Kanta Matsuura:
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.
INDOCRYPT 2006: 48-62 |
| 2005 |
| 26 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Security Weaknesses of Certain Broadcast Encryption Schemes.
DRMTICS 2005: 228-245 |
| 25 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys.
DRMTICS 2005: 258-276 |
| 24 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks.
INDOCRYPT 2005: 155-168 |
| 2004 |
| 23 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.
ICICS 2004: 375-387 |
| 22 | EE | Miodrag J. Mihaljevic,
Hideki Imai:
The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters.
SCN 2004: 310-323 |
| 2003 |
| 21 | EE | Miodrag J. Mihaljevic:
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy.
ASIACRYPT 2003: 137-154 |
| 20 | EE | Miodrag J. Mihaljevic:
Broadcast Encryption Schemes Based on the Sectioned Key Tree.
ICICS 2003: 158-169 |
| 2002 |
| 19 | EE | Paul Camion,
Miodrag J. Mihaljevic,
Hideki Imai:
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).
Selected Areas in Cryptography 2002: 196-213 |
| 2001 |
| 18 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Fast Correlation Attack Algorithm with List Decoding and an Application.
FSE 2001: 196-210 |
| 2000 |
| 17 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack.
FSE 2000: 196-212 |
| 16 | | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
A method for convergence analysis of iterative probabilistic decoding.
IEEE Transactions on Information Theory 46(6): 2206-2211 (2000) |
| 1999 |
| 15 | | Marc P. C. Fossorier,
Miodrag J. Mihaljevic,
Hideki Imai:
Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications.
AAECC 1999: 282-293 |
| 1998 |
| 14 | EE | Miodrag J. Mihaljevic,
Yuliang Zheng,
Hideki Imai:
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation.
Public Key Cryptography 1998: 217-233 |
| 1997 |
| 13 | | Miodrag J. Mihaljevic:
An Iterative Probabilistic Decoding Algorithm for Binary Linear Block Codes Beyond the Half Minimum Distance.
AAECC 1997: 237-249 |
| 12 | | Miodrag J. Mihaljevic:
Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach.
AAECC 1997: 250-262 |
| 11 | | Miodrag J. Mihaljevic:
An improved key stream generator based on the programmable cellular automata.
ICICS 1997: 181-191 |
| 1996 |
| 10 | | Miodrag J. Mihaljevic:
A faster cryptanalysis of the self-shrinking generator.
ACISP 1996: 182-189 |
| 1994 |
| 9 | | Miodrag J. Mihaljevic:
A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function.
ASIACRYPT 1994: 67-79 |
| 1993 |
| 8 | | Miodrag J. Mihaljevic:
On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II.
Error Control, Cryptology, and Speech Compression 1993: 13-24 |
| 1992 |
| 7 | | Miodrag J. Mihaljevic:
An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure.
AUSCRYPT 1992: 349-356 |
| 6 | EE | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence.
EUROCRYPT 1992: 124-137 |
| 1991 |
| 5 | EE | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
A Comparison of Cryptoanalytic Principles Based on Iterative Error-Correction.
EUROCRYPT 1991: 527-531 |
| 4 | | Jovan Dj. Golic,
Miodrag J. Mihaljevic:
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance.
J. Cryptology 3(3): 201-212 (1991) |
| 1990 |
| 3 | | Miodrag J. Mihaljevic,
Jovan Dj. Golic:
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence.
AUSCRYPT 1990: 165-175 |
| 2 | EE | Jovan Dj. Golic,
Miodrag J. Mihaljevic:
A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach.
EUROCRYPT 1990: 487-491 |
| 1 | | Jovan Dj. Golic,
Miodrag J. Mihaljevic:
Minimal linear equivalent analysis of a variable-memory binary sequence generator.
IEEE Transactions on Information Theory 36(1): 190- (1990) |