Researchers

Publications



Refined By:
Type:  Conference Paper
???jsp.search.filter.citation_category???:  M30/M60

Results 61-80 of 81

Issue DateTitleAuthor(s)TypeМ-cat.
2005A Novel Broadcast Encryption Based on Time-Bound Cryptographic KeysFossorier, Marc P. C.; Mihaljević, Miodrag J.  ; Imai, HidekiConference Paper
Mp. category will be shown later
2004A method for data access control in certain storage area networksMihaljević, Miodrag J.  ; Imai, HidekiConference Paper
Mp. category will be shown later
2004One-way mapping of keys and the overheads trade-off in key management schemes for broadcast encryptionMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiConference Paper
Mp. category will be shown later
2004Framework of a novel technique for algebraic and fast correlation attacks based on dedicated sample decimationMihaljević, Miodrag J.  ; Imai, HidekiConference Paper
Mp. category will be shown later
2003An improved fast correlation attack based on list decodingMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiConference Paper
Mp. category will be shown later
2002On wireless communications privacy and security evaluation of encryption techniquesMihaljević, Miodrag J.  ; Kohno, RyujiConference Paper
Mp. category will be shown later
2002On a framework for employment of cryptographic components in software defined radioMihaljević, Miodrag J.  ; Kohno, RyujiConference Paper
Mp. category will be shown later
2002A proposal of architectural, elements for implementing secure software download service in software defined radioMichael, Lachlan B.; Mihaljević, Miodrag J.  ; Haruyama, Shinichiro; Kohno, RyujiConference Paper
Mp. category will be shown later
2002Cryptanalysis of TOYOCRYPT-HS1 stream cipherMihaljević, Miodrag J.  ; Imai, HidekiConference Paper
Mp. category will be shown later
2001On employment of different weight parity-checks for the fast correlation attackMihaljević, Miodrag J.  ; Imai, HidekiConference Paper
Mp. category will be shown later
2000A novel fast correlation attack suitable for simple hardware implementationMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiConference Paper
Mp. category will be shown later
2000Applications of iterative decoding techniques to cryptographyImai, Hideki; Mihaljević, Miodrag J.  ; Isaka, M.; Fossorier, Marc P. C.Conference Paper
Mp. category will be shown later
2000A time-memory trade-off for the fast correlation attackMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiConference Paper
Mp. category will be shown later
2000A new program for cryptographic authetification control of dataBojanić, Slobodan; Mihaljević, Miodrag J.  ; Ognjanović, Zoran  Conference Paper
Mp. category will be shown later
2000Vulnerability of certain keystream generators based on resilient functionsCamion, P.; Mihaljević, Miodrag J.  ; Imai, HidekiConference Paper
Mp. category will be shown later
1999New software for cryptographic control of data integrityBojanić, Slobodan; Mihaljević, Miodrag J.  ; Ognjanović, Zoran  Conference Paper
Mp. category will be shown later
1998Reduced Complexity Iterative Decoding of Low Density Parity Check Codes Based on Belief PropagationFossorier, Marc P. C.; Mihaljević, Miodrag J.  ; Imai, HidekiConference Paper
Mp. category will be shown later
1998Fast and secure stream cipher based on cellular automata over GF(q)Mihaljević, Miodrag J.  ; Zheng, Yuliang; Imai, HidekiConference Paper
Mp. category will be shown later
1998Construction of Fast MAC Based on Linear Cellular Automata over GF(q)Mihaljević, Miodrag J.  ; Imai, HidekiConference Paper
Mp. category will be shown later
1998A Fast Cryptographic Hash Function Based on Cellular Automata over GF(q)Mihaljević, Miodrag J.  ; Zheng, Yuliang; Imai, HidekiConference Paper
Mp. category will be shown later

Results 61-80 of 81