Browsing eNauka
Browsing by Author Imai, Hideki
Showing results 1 to 20 of 62
next >
Issue Date | Title | Author(s) | Type | Мp-cat. |
---|---|---|---|---|
2008 | A cellular automata based HB#-like low complexity authentication technique | Mihaljević, Miodrag J. ![]() ![]() | Article | Mp. category will be shown later |
1999 | A family of fast dedicated one-way hash functions based on linear cellular automata over GF(qr) | Mihaljević, Miodrag J. ![]() ![]() | Article | 22M22 |
1999 | A family of fast keystream generators based on programmable linear cellular automata over GF (q) and time-variant table | Mihaljević, Miodrag J. ![]() ![]() | Article | 22M22 |
1998 | A Fast Cryptographic Hash Function Based on Cellular Automata over GF(q) | Mihaljević, Miodrag J. ![]() ![]() | Conference Paper | Mp. category will be shown later |
2006 | A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation | Mihaljević, Miodrag J. ![]() ![]() | Article | 23M23 |
2006 | A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation | Mihaljević, Miodrag ![]() ![]() | Conference Paper | Mp. category will be shown later |
2010 | A generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack | Mihaljević, Miodrag ![]() ![]() | Conference Paper | Mp. category will be shown later |
2006 | A hierarchical key management approach for secure multicast | Wang, Jian; Mihaljević, Miodrag J. ![]() ![]() | Article | 23M23 |
2010 | A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding | Mihaljević, Miodrag ![]() ![]() | Conference Paper | Mp. category will be shown later |
2007 | A Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing | Mihaljević, Miodrag J. ![]() ![]() | Conference Paper | Mp. category will be shown later |
2001 | A Low-Complexity and High-Performance algorithm for the fast correlation attack | Mihaljević, Miodrag J. ![]() ![]() | Article | 21M21 |
1999 | A message authentication approach for for information systems | Mihaljević, Miodrag J. ![]() ![]() | Article | Mp. category will be shown later |
2004 | A method for data access control in certain storage area networks | Mihaljević, Miodrag J. ![]() ![]() | Conference Paper | Mp. category will be shown later |
2005 | A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ![]() ![]() | Conference Paper | Mp. category will be shown later |
2006 | A novel broadcast encryption based on time-bound cryptographic keys | Mihaljević, Miodrag J. ![]() ![]() | Article | 23M23 |
2000 | A novel fast correlation attack suitable for simple hardware implementation | Mihaljević, Miodrag J. ![]() ![]() | Conference Paper | Mp. category will be shown later |
2008 | A stream cipher design based on embedding of random bits | Mihaljević, Miodrag J. ![]() ![]() | Conference Paper | Mp. category will be shown later |
2008 | A Stream Ciphering Approach Based on the Wire-Tap Channel Coding | Mihaljević, Miodrag J. ![]() ![]() | Conference Paper | Mp. category will be shown later |
2000 | A time-memory trade-off for the fast correlation attack | Mihaljević, Miodrag J. ![]() ![]() | Conference Paper | Mp. category will be shown later |
2005 | A unified analysis for the fast correlation attack | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ![]() ![]() | Conference Paper | Mp. category will be shown later |