default search action
Miodrag J. Mihaljevic
- > Home > Persons > Miodrag J. Mihaljevic
Publications
- 2012
- [j17]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of grain-v1 employing normality order of the filter function. IET Inf. Secur. 6(2): 55-64 (2012) - [j16]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Inf. Process. Lett. 112(21): 805-810 (2012) - [j15]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128. Period. Math. Hung. 65(2): 205-227 (2012) - 2011
- [c36]Miodrag J. Mihaljevic, Hideki Imai, Michael W. David, Kazukuni Kobara, Hajime Watanabe:
On advanced cryptographic techniques for information security of smart grid AMI. CSIIRW 2011: 64 - 2010
- [c34]Miodrag J. Mihaljevic, Hajime Watanabe, Hideki Imai:
A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding. ISITA 2010: 690-695 - [c33]Miodrag J. Mihaljevic, Hideki Imai:
A Security evaluation of certain stream ciphers which involve randomness and coding. ISITA 2010: 789-794 - [c32]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack. ISITA 2010: 911-916 - [i3]Miodrag J. Mihaljevic, Frédérique E. Oggier, Hideki Imai:
Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm. CoRR abs/1012.5895 (2010) - 2009
- [j14]Miodrag J. Mihaljevic, Hideki Imai:
An approach for stream ciphers design based on joint computing over random and secret data. Computing 85(1-2): 153-168 (2009) - 2007
- [j13]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off. IEEE Commun. Lett. 11(12): 988-990 (2007) - [j12]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(6): 1248-1251 (2007) - [j11]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Modeling Block Decoding Approaches for the Fast Correlation Attack. IEEE Trans. Inf. Theory 53(12): 4728-4737 (2007) - [c31]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Decimation-Based Fast Correlation Attack. ISIT 2007: 456-460 - 2006
- [c30]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. AAECC 2006: 203-214 - [c29]Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai:
A Hierarchical Key Management Approach for Secure Multicast. ARCS 2006: 422-434 - [c28]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura:
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. INDOCRYPT 2006: 48-62 - [i2]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura:
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication. IACR Cryptol. ePrint Arch. 2006: 197 (2006) - 2005
- [j10]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Key management with minimized secret storage employing an erasure channel approach. IEEE Commun. Lett. 9(8): 741-743 (2005) - [c27]Miodrag J. Mihaljevic, Hideki Imai:
Novel method for implementation of certain key management schemes to minimize secret storage. CCNC 2005: 54-59 - [c26]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Security Weaknesses of Certain Broadcast Encryption Schemes. DRMTICS 2005: 228-245 - [c25]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. DRMTICS 2005: 258-276 - [c24]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. INDOCRYPT 2005: 155-168 - [c23]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
A unified analysis for the fast correlation attack. ISIT 2005: 2012-2015 - [i1]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes. IACR Cryptol. ePrint Arch. 2005: 99 (2005) - 2004
- [c22]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. ICICS 2004: 375-387 - [c21]Miodrag J. Mihaljevic, Hideki Imai:
The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. SCN 2004: 310-323 - 2002
- [j5]Miodrag J. Mihaljevic, Hideki Imai:
Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 66-73 (2002) - [c17]Paul Camion, Miodrag J. Mihaljevic, Hideki Imai:
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). Selected Areas in Cryptography 2002: 196-213 - 2001
- [c15]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Fast Correlation Attack Algorithm with List Decoding and an Application. FSE 2001: 196-210 - 2000
- [c14]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. FSE 2000: 196-212 - 1999
- [j3]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Reduced complexity iterative decoding of low-density parity check codes based on belief propagation. IEEE Trans. Commun. 47(5): 673-680 (1999) - [c13]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications. AAECC 1999: 282-293 - 1998
- [c12]Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai:
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Public Key Cryptography 1998: 217-233
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint