The following pages link to Miodrag J. Mihaljević (Q456132):
Displayed 34 items.
- Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function (Q456133) (← links)
- A protocol for provably secure authentication of a tiny entity to a high performance computing one (Q1793779) (← links)
- A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance (Q2277233) (← links)
- An approach for stream ciphers design based on joint computing over random and secret data (Q2390944) (← links)
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 (Q2434149) (← links)
- A method for convergence analysis of iterative probabilistic decoding (Q2705946) (← links)
- Fast Correlation Attack Algorithm with List Decoding and an Application (Q3046605) (← links)
- (Q3123573) (← links)
- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence (Q3210180) (← links)
- Minimal linear equivalent analysis of a variable-memory binary sequence generator (Q3481641) (← links)
- Modeling Block Decoding Approaches for the Fast Correlation Attack (Q3548958) (← links)
- (Q3597524) (← links)
- (Q3840096) (← links)
- (Q4036903) (← links)
- (Q4037498) (← links)
- (Q4279667) (← links)
- (Q4341701) (← links)
- (Q4341780) (← links)
- MHD Free Convection from a Vertical Semi‐Infinite Flat Plate with a Step Change in the Magnetic Field (Q4358334) (← links)
- (Q4373629) (← links)
- (Q4413863) (← links)
- (Q4470474) (← links)
- (Q4470475) (← links)
- (Q4502636) (← links)
- (Q4505637) (← links)
- (Q4537992) (← links)
- On message protection in cryptosystems modelled as the generalized wire-tap channel II (Q4637798) (← links)
- (Q5259353) (← links)
- Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks (Q5450984) (← links)
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication (Q5458265) (← links)
- Information and Communications Security (Q5464805) (← links)
- Security in Communication Networks (Q5491707) (← links)
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (Q5898593) (← links)
- Advances in Cryptology - ASIACRYPT 2003 (Q5902379) (← links)