Issue Date | Title | Author(s) | Type | М-cat. |
2009 | An approach for stream ciphers design based on joint computing over random and secret data | Mihaljević, Miodrag J. ; Imai, Hideki | Article | |
2008 | A cellular automata based HB#-like low complexity authentication technique | Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | Article | |
2007 | Generic framework for the secure Yuen 2000 quantum-encryption protocol employing the wire-tap channel approach | Mihaljević, Miodrag J. ![](/image/organisations_icon_ico.png) | Article | |
2007 | Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Article | |
2007 | Modeling block decoding approaches for the fast correlation attack | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Article | |
2007 | Birthday paradox based security analysis of certain broadcast encryption schemes | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Article | |
2006 | Security weaknesses of certain broadcast encryption schemes | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Article | |
2006 | A novel broadcast encryption based on time-bound cryptographic keys | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Article | |
2006 | An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication | Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki; Cui, Yang; Matsuura, Kanta | Article | |
2006 | A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Article | |
2006 | A hierarchical key management approach for secure multicast | Wang, Jian; Mihaljević, Miodrag J. ; Harn, Lein; Imai, Hideki | Article | |
2005 | Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Article | |
2005 | The decimated sample based improved algebraic attacks on the nonlinear filters | Mihaljević, Miodrag J. ; Imai, Hideki | Article | |
2005 | Key management with minimized secret storage employing an erasure channel approach | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Article | |
2004 | Reconfigurable key management for broadcast encryption | Mihaljević, Miodrag J. ![](/image/organisations_icon_ico.png) | Article | |
2004 | Secret-public storage trade-off for broadcast encryption key management | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Article | |
2003 | On vulnerabilities and improvements of fast encryption algorithm for multimedia FEA-M | Mihaljević, Miodrag J. ![](/image/organisations_icon_ico.png) | Article | |
2003 | Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q) | Camion, Paul; Mihaljević, Miodrag J. ; Imai, Hideki | Article | |
2003 | Key management schemes for stateless receivers based on time varying heterogeneous logical key hierarchy | Mihaljević, Miodrag J. ![](/image/organisations_icon_ico.png) | Article | |
2003 | Broadcast encryption schemes based on the sectioned key tree | Mihaljević, Miodrag J. ![](/image/organisations_icon_ico.png) | Article | |