Researchers

Publications



Refined By:
???jsp.search.filter.citation_category???:  M20/M50

Results 1-20 of 23

Issue DateTitleAuthor(s)TypeМ-cat.
2020Bitcoin, Blockchain Technology and Cryptography - An Illustration of Certain IssuesMihaljević, Miodrag J.  Article
Mp. category will be shown later
2016Security evaluation of the NHB# authentication protocol against a MIM attackTomović, Siniša S.  ; Knežević, Milica  ; Mihaljević, Miodrag  ; Perović, Aleksandar M.  ; Ognjanović, Zoran  Article
Mp. category will be shown later
2016Security evaluation of NHB# authentication protocol against a MIM attackTomović, Siniša  ; Knežević, Milica  ; Mihaljević, Miodrag J.  ; Perović, Aleksandar; Ognjanović, Zoran  Article
Mp. category will be shown later
2016An Algebraic Security Evaluation Approach of Certain Encryption TechniquesMihaljević, Miodrag  Article
Mp. category will be shown later
2016Experimental Evaluation of Certain Securty Issues of Grain v1 Stream CipherArsić, Aleksandra  ; Jelisavčić, Vladisav  ; Mihaljević, Miodrag  Article
Mp. category will be shown later
2016Experimental Evaluation of Certain Security Issues of Grain v1 Stream CipherArsić, Aleksandra  ; Jelisavčić, Vladislav; Mihaljević, Miodrag J.  Article
Mp. category will be shown later
2015Privacy Preserving Light-Weight Authentication Based on a Variant of Niederreiter Public-Key EncryptionMihaljević, Miodrag  ; Hideki ImaiArticle
Mp. category will be shown later
2008A cellular automata based HB#-like low complexity authentication techniqueMihaljević, Miodrag J.  ; Watanabe, Hajime; Imai, HidekiArticle
Mp. category will be shown later
2002Security evaluation of stream ciphersMihaljević, Miodrag J.  ; Watanabe, Hajime; Imai, HidekiArticle
Mp. category will be shown later
2002On employment of LFSRs over GF(q) in certain stream ciphersCamion, Paul; Mihaljević, Miodrag J.  ; Imai, HidekiArticle
Mp. category will be shown later
2000Novel fast correlation attacks via iterative decoding of punctured simplex codesMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
Mp. category will be shown later
2000On cryptographic approaches for security of information technologiesMihaljević, Miodrag J.  ; Marković, ZoranArticle
Mp. category will be shown later
1999A message authentication approach for for information systemsMihaljević, Miodrag J.  ; Imai, HidekiArticle
Mp. category will be shown later
1999Elektronska trgovina, elektronski novac i kriptografske tehnike: Jedan osvrt na savremene trendoveMihaljević, Miodrag J.  ; Stijović, D.; Marić, B.; Popadić, S.; Ivanović, M.Article
Mp. category will be shown later
1999Koncept za uporedjivanje i uporedni pregled tri tehnike za za stitu informacionih sistema: Kerberos, SESAME i SSHMihaljević, Miodrag J.  ; Stijović, D.; Marić, B.; Popadić, S.; Ivanović, M.Article
Mp. category will be shown later
1998A cellular automaton based fast one-way hash function suitable for hardware implementationMihaljević, Miodrag J.  ; Zheng, Yuliang; Imal, HidekiArticle
Mp. category will be shown later
1997An iterative probabilistic decoding algorithm for binary linear block codes beyond the half minimum distanceMihaljević, Miodrag J.  Article
Mp. category will be shown later
1997An improved key stream generator based on the programmable cellular automataMihaljević, Miodrag J.  Article
Mp. category will be shown later
1997Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approachMihaljević, Miodrag J.  Article
Mp. category will be shown later
1996A sequence comparison approach for decoding of general binary block code after the binary summetric channel with synchronization errorsMihaljević, Miodrag J.  Article
Mp. category will be shown later

Results 1-20 of 23