Researchers

Publications



Refined By:
Type:  article
Date Issued:  [2000 TO 2009]

Results 1-20 of 32

Issue DateTitleAuthor(s)TypeМ-cat.
2009An approach for stream ciphers design based on joint computing over random and secret dataMihaljević, Miodrag J.  ; Imai, HidekiArticle
22M22
2008A cellular automata based HB#-like low complexity authentication techniqueMihaljević, Miodrag J.  ; Watanabe, Hajime; Imai, HidekiArticle
Mp. category will be shown later
2007Generic framework for the secure Yuen 2000 quantum-encryption protocol employing the wire-tap channel approachMihaljević, Miodrag J.  Article
21aM21a
2007Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-offMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
21M21
2007Modeling block decoding approaches for the fast correlation attackFossorier, Marc P. C.; Mihaljević, Miodrag J.  ; Imai, HidekiArticle
21aM21a
2007Birthday paradox based security analysis of certain broadcast encryption schemesMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
23M23
2006Security weaknesses of certain broadcast encryption schemesMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
23M23
2006A novel broadcast encryption based on time-bound cryptographic keysMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
23M23
2006An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authenticationFossorier, Marc P. C.; Mihaljević, Miodrag J.  ; Imai, Hideki; Cui, Yang; Matsuura, KantaArticle
23M23
2006A general formulation of algebraic and fast correlation attacks based on dedicated sample decimationMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
23M23
2006A hierarchical key management approach for secure multicastWang, Jian; Mihaljević, Miodrag J.  ; Harn, Lein; Imai, HidekiArticle
23M23
2005Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacksMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
23M23
2005The decimated sample based improved algebraic attacks on the nonlinear filtersMihaljević, Miodrag J.  ; Imai, HidekiArticle
23M23
2005Key management with minimized secret storage employing an erasure channel approachMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
21M21
2004Reconfigurable key management for broadcast encryptionMihaljević, Miodrag J.  Article
21M21
2004Secret-public storage trade-off for broadcast encryption key managementMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
22M22
2003On vulnerabilities and improvements of fast encryption algorithm for multimedia FEA-MMihaljević, Miodrag J.  Article
22M22
2003Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q)Camion, Paul; Mihaljević, Miodrag J.  ; Imai, HidekiArticle
22M22
2003Key management schemes for stateless receivers based on time varying heterogeneous logical key hierarchyMihaljević, Miodrag J.  Article
22M22
2003Broadcast encryption schemes based on the sectioned key treeMihaljević, Miodrag J.  Article
22M22

Results 1-20 of 32