Miodrag Mihaljevic
Miodrag Mihaljevic
Mathematical Institute of the Serbian Academy of Sciences and Arts
在 mi.sanu.ac.rs 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Reduced complexity iterative decoding of low-density parity check codes based on belief propagation
MPC Fossorier, M Mihaljevic, H Imai
IEEE Transactions on communications 47 (5), 673-680, 1999
13331999
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
D Ünay, Z Çataltepe, S Aksoy
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2010
163*2010
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
JD Golić, MJ Mihaljević
Journal of Cryptology 3 (3), 201-212, 1991
1321991
An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication
MPC Fossorier, MJ Mihaljević, H Imai, Y Cui, K Matsuura
International Conference on Cryptology in India, 48-62, 2006
972006
A low-complexity and high-performance algorithm for the fast correlation attack
MJ Mihaljević, MPC Fossorier, H Imai
International Workshop on Fast Software Encryption, 196-212, 2000
832000
Fast correlation attack algorithm with list decoding and an application
MJ Mihaljevi, MPC Fossorier, H Imai
International Workshop on Fast Software Encryption, 196-210, 2001
762001
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
MJ Mihaljevic, JD Golic
International Conference on Cryptology, 165-175, 1990
761990
Cryptanalysis of Toyocrypt-HS1 stream cipher
MJ Mihaljevic, H Imai
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2002
752002
A faster cryptanalysis of the self-shrinking generator
MJ Mihaljević
Australasian Conference on Information Security and Privacy, 182-189, 1996
631996
A framework for secure download for software-defined radio
LB Michael, MJ Mihaljevic, S Haruyama, R Kohno
IEEE Communications Magazine 40 (7), 88-96, 2002
482002
A comparison of cryptanalytic principles based on iterative error-correction
MJ Mihaljević, JD Golić
Workshop on the Theory and Application of of Cryptographic Techniques, 527-531, 1991
481991
An approach for stream ciphers design based on joint computing over random and secret data
MJ Mihaljević, H Imai
Computing 85 (1), 153-168, 2009
452009
Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence
MJ Mihaljević, JD Golić
Workshop on the Theory and Application of of Cryptographic Techniques, 124-137, 1992
441992
Wireless data communication method and apparatus for software download system
L Michael, M Mihaljevic
US Patent 7,502,941, 2009
432009
Internal state recovery of Grain-v1 employing normality order of the filter function
MJ Mihaljević, S Gangopadhyay, G Paul, H Imai
IET Information Security 6 (2), 55-64, 2012
402012
A cellular automaton based fast one-way hash function suitable for hardware implementation
M Mihaljević, Y Zheng, H Imai
International Workshop on Public Key Cryptography, 217-233, 1998
351998
Key management schemes for stateless receivers based on time varying heterogeneous logical key hierarchy
MJ Mihaljević
International Conference on the Theory and Application of Cryptology and …, 2003
322003
A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q)
M Mihaljevic, Y Zheng, H Imai
IEICE Transactions on Fundamentals of Electronics, Communications and …, 1999
301999
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128
M Mihaljević, S Gangopadhyay, G Paul, H Imai
Periodica Mathematica Hungarica 65 (2), 205-227, 2012
292012
Generic framework for the secure Yuen 2000 quantum-encryption protocol employing the wire-tap channel approach
MJ Mihaljević
Physical Review A 75 (5), 052334, 2007
292007
系统目前无法执行此操作,请稍后再试。
文章 1–20